All Episodes

March 1, 2025 • 59 mins

🚨 Get ready for the latest episode of The JMOR Tech Talk Show! 🚨

The tech world is constantly evolving, and in today’s episode, we break down some of the biggest headlines making waves across industries. From groundbreaking changes in data protection to the latest advancements in quantum computing, we've got you covered! If you want to stay ahead of the curve, make sure to tune in for all the must-know details. 🎧 The episode releases within 24 hours, so don't miss out!

You can catch the show at The JMOR Tech Talk Show and explore even more unique content at BelieveMeAchieve.com. 🎙️ Let’s dive into today's hot topics:

Apple's decision to remove a critical data protection feature in the UK has sparked concerns around privacy and government influence. Due to government demands, Apple pulled the feature that would have provided enhanced protection for user data. This move has raised alarms about the balance between privacy rights and compliance with government regulations, and it's likely to set a precedent for other tech giants in how they handle privacy-related requests from governments worldwide. This development underscores the growing tensions between data protection and government intervention in the tech industry. 🇬🇧🔒

Waze has officially been recognized as a “Very Large Online Platform” under EU rules. This status comes with heightened responsibilities, including more stringent oversight and the need for Waze to comply with the European Union’s Digital Services Act. The recognition is part of a broader effort to regulate Big Tech companies more closely, ensuring they adhere to rules designed to promote user safety and transparency. For Waze, this could mean greater scrutiny over the data they handle and how they moderate content within their app. 🗺️📱

In a bold move, Musk's X (formerly Twitter) has challenged a German court ruling over the sharing of election data. Musk’s company is pushing back against the court’s decision, arguing that it infringes on the platform's freedom of speech and operational autonomy. This legal battle highlights the ongoing tension between tech companies and governments, especially when it comes to regulating content and the role of social media in political events. The outcome could have significant implications for how social media platforms are held accountable for the data they share during elections. ⚖️💬

Google is facing serious charges in the European Union over breaches of Big Tech regulations. The EU has accused Google of violating competition rules and failing to adhere to transparency requirements set forth under the Digital Markets Act. These charges highlight the EU’s growing efforts to rein in the influence of major tech firms and ensure fair competition within the digital space. If found guilty, Google could face hefty fines and be required to change how it operates in Europe. 🏛️🔍

Telstra, Australia’s leading telecommunications company, has been accused of misleading its customers about internet speeds. An investigation revealed that Telstra was advertising speeds that were not consistently achievable, leading to consumer frustration and regulatory scrutiny. The case underscores the importance of accurate marketing in the tech industry, especially as consumers rely heavily on internet service providers for their connectivity needs. It’s a reminder that companies must be transparent about their offerings to avoid legal repercussions. 📶🛑

Musk has recently threatened to escalate the situation with the FBI and FAA over unanswered emails related to his companies. Musk’s outburst underscores the growing frustration tech leaders face when they encounter delays or roadblocks in their communications with government agencies. Musk, known for his blunt communication style, has indicated that he will take further action if these critical

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:03):
Hi everyone, I'm John Seymour, the host of
The JMOR Tech Talk show and inspirations for
your life.

(00:27):
Hey guys,

(00:49):
welcome to The JMOR Tech Talk show.
It's great to be with you here on
this last Friday of February.
Or this is February 28th, if you are
watching us here live, or if you're watching
us on a replay or playback, you can
go to believemeachieved.com to watch this and
as well as many other episodes in short

(01:11):
form and long form content.
So definitely check that out, everyone really would
appreciate it.
And we have a great show for you
today.
Lot going on in the tech world, just
a lot going on.
Our title is Tech Tides, from Apple's shifts
to quantum breakthroughs.
We're on series four in case you didn't

(01:32):
know it.
And this is going to be a pretty
amazing, amazing, amazing show if I do say
so myself.
So I am very grateful that you guys
are with me here and that you're coming
to learn about all this great technology because
we've got so much happening right now that

(01:55):
it's not even funny.
So I guess the first thing I probably
should start off with is one of the
most important points, which is something that's been
around for a while, but it's just starting
to take some action now by Apple.
And Apple's decision to remove a critical data

(02:16):
protection feature in the UK now has sparked
concern around privacy and government influence.
Due to government demands, Apple pulled the feature
that would have provided enhanced protection for user
data.
This move has raised alarms about the balance
between privacy rights and compliance with government regulations.
And it's likely to set a precedence for

(02:39):
other tech giants in how they handle privacy
related requests from governments worldwide.
Now, this development underscores the growing tensions between
data protection and, of course, government intervention in
the tech industry.
Ladies and gentlemen, if I did not introduce
myself, I know I got right into the
show here today.

(02:59):
I am John C.
Morley, serial entrepreneur.
I'm not only a podcast host, but I'm
also a podcast coach.
It is my privilege and pleasure to be
with you once again for The JMOR
Tech Talk Show.
Again, this is series four and we are
on show number nine.
If you'd like to go ahead and grab
something from your kitchen, whether it's something hot,
something cold, something sweet, something tart or not,

(03:22):
something healthy, maybe could be a piece of
fruit or anything else and hurry on back
because I don't want you to be parched
or to be famished while you're watching or
listening to the show.
And our second story comes to us from
Waze.
So Waze has officially been recognized as a
very large online platform.

(03:43):
Under the European Union rules now, the status
comes with heightened responsibilities, including more stringent oversight
and need for ways to comply with European
Union's Digital Services Act.
The recognition is part of a broader effort
to regulate big tech companies more closely, ensuring
they adhere to rules designed to promote user

(04:03):
safety and transparency.
That means the type of content they provide
needs to be well approved for general audiences.
So for Waze, this could mean greater scrutiny
over the data they handle and how they
moderate content.
And we know in the past that Waze
has been a little bit lax in this

(04:25):
department.
So I'm anxious to see, you know, what
is Waze, you know, what is Waze going
to do with this new, let's say, requirement
for, you know, basically data regulation.

(04:46):
And I know this is something they're probably
not happy about, but it's important if they
want to stay at the top.
So basically for data moderation is what we
really call it.
And so, you know, Waze has been, you
know, around for quite a while and their

(05:07):
mission is to work together to improve the
quality of everyone's daily driving by taking part
in a Waze community.
You know, you're basically saying that you are
going to do the right things for the
greater good of the community.
But that doesn't always mean everyone's going to
act in that manner.
So they need to definitely, let's say, kick

(05:30):
it up a few notches, as Emerald would
say, and make sure that the information that
they are providing is adhering to the Digital
Service Act's standard.
And although this might sound like something that's
very, let's say, rudimentary, if they mess up,

(05:53):
well, they could drop very, very low.
And Mr. Musk is making his way up
the chain, yes.
In a bold move, Elon Musk's ex, formerly
Twitter, has challenged a German court ruling over
the sharing of election data.
This is really hot.
Musk's company is pushing back against the court's

(06:15):
decision, arguing that it infringes on the platform's
freedom of speech and operational autonomy.
Check that out.
This legal battle highlights the ongoing tension between
tech companies and governments, especially when it comes
to regulating content and the role of social
media in political events.
So the outcome would have significant implications for

(06:37):
how social media platforms are held accountable for
the data they share during elections.
And we know that in the past there's
been a lot of clampdown, whether it's been
social media like Facebook, other things Meta has,
Instagram, ex, formerly Twitter, even Snapchat.

(06:59):
There's been a lot of controversy about the
information.
First of all, is the information that's being
shared actually fact or is it opinion?
And is the information that's going up there
really good or is it something else?

(07:20):
I don't know.
I think most people don't understand that it's
about the fact that we need to be
transparent in everything that we do.
If we can't be transparent and we start
sending all this information out there and now

(07:42):
it gets disseminated and people are seeing it
and hearing it and then choosing to respond
based on information they think is factual and
true, all that creates a big anarchy.
So I think this is really something that
has been needed for a long time and
I hope that they finally address it.
We know the European Union's been doing it,

(08:04):
but I think the United States of America
needs to be as proactive as the European
Union because the European Union doesn't let anybody
get away with anything.
We found that out in the last six
months to a year.
And Google is facing serious charges in the
European Union over breaches of big tech regulations.

(08:24):
The European Union has accused Google of violating
competition rules and failing to adhere to transparency
requirements set forth under the DMA, the Digital
Markets Act.
And these charges highlight the European Union's growing
efforts to rein in the influence of major
tech firms and ensure fair competition within the

(08:48):
digital space.
Now, if Google is found guilty, they could
face hefty fines and be required to change
how they operate in Europe.
Well, that's great.
But what about the people in the United
States?
What is it going to take for our
government in the United States to actually decide

(09:08):
to take action?
I mean, we started to take action with,
you know, with TikTok, right?
And then Trump has this temporary, let's say,
order in place that's giving them some time.
So when does TikTok have to be resolved?

(09:29):
Well, according to what we spoke about a
while back, I believe they have a little
bit of time yet, but now they have,
I think it's still around, I think it's
April something.
And so this is a big problem.
The new the new date that actually reflected

(09:51):
the, let's say, the delay of the TikTok
ban, it was for 75 days and it's
April 5th.
So that may seem like a lot of
time to find a sale or resolution with
ByteDance.
TikTok's Chinese parent company.
But deadlines have a habit of sneaking up
on you and it doesn't seem like anything

(10:12):
is really happening.
So I'm curious, are we going to go
through that same debacle like we did last
time where they shut everything down and then
Trump decides to make a statement and then
they give it more time?
I mean, if that happens, then we've really
got to say something because that means they're
just constantly putting it off tomorrow, tomorrow, tomorrow,
right?

(10:32):
Like your friend says, you know, I'll help
you tomorrow.
You go back to him.
Oh, no, I'll do it tomorrow.
It's always tomorrow.
But tomorrow keeps being tomorrow and they never
help, right?
They always have empty excuses.
And Telstra, I don't know if you guys
know who Telstra is.
So Telstra is a broadband Internet company.
And Telstra, Australia's leading telecommunications company, has been

(10:57):
accused of misleading its customers about Internet speeds.
And an investigation revealed that Telstra was advertising
speeds that were not consistently achievable, leading to
consumer frustration and regulatory scrutiny.
The case underscores the importance of accurate marketing
in the tech industry, especially as consumers rely

(11:17):
heavily on the Internet service providers for their
connectivity needs.
It's a reminder to all of us that
companies must be transparent about their offerings to
avoid legal repercussions.
And, you know, this is interesting.
But the thing is, I just hope that

(11:38):
people realize what transparency really means.
And so Telstra found to have misled nearly
9000 customers over broadband speed claims.
So the federal court found that Tesla made
the false or misleading representations relating to the

(11:59):
upload speeds of residential broadband Internet services supplied
to nearly 9000 of its Belong customers.
Following the court action by the ACCC in
October and November 2020, Telstra migrated 8000 Air
97 customers who were on a Belong NBN

(12:19):
plan with a maximum download speed of 100
megabits per second and a maximum upload speed
of 40 megabits per second to service with
a maximum upload speed of 20 megabits per
second.
Telstra did not notify customers of the reduction
in the maximum upload speed in their service
and Telstra's failure to inform customers that their
broadband service had been altered denied them the

(12:40):
opportunity to decide whether the change service was
suitable for their needs.
And this is all according to the ACCC
Commissioner Lisa Carver.
There was no reduction to the price.
Telstra charged its customers, even though the cost
charged by NBN company to Telstra was $7
a month less for the new lower speed

(13:00):
service.
So Telstra admitted that it had represented to
2785 people of the Belong customers who acquired
the 40 megabit plan between May 1st, 2017
and 19th of September 2018, that they were
receiving a Belong NBN broadband service with a
maximum upload speed of 40 megabits per second

(13:21):
when they were not.
Telstra continued to make these representations by failing
to update customers once the unilateral migration had
occurred.
The court also found that Telstra had made
false or misleading representations to a further 6
,112 Belong customers who had acquired 40 megabit
service plan between September 20th and September 2018

(13:43):
and October 2020.
While Telstra never stated the maximum speed upload
to these customers, the court found that these
consumers were and did have reasonable grounds of
the construction of the service to which they
were bound and the same in all material
aspects, including upload speeds as it had always

(14:04):
been.
And quote, Ms. Carver said, quote, it is
simply unacceptable for a supplier of essential services
to mislead the consumers when reducing the quality
of service is providing to its customers.
So, um, I think it's great that they
jumped on this.
And I think the interesting thing about Telstra

(14:27):
is that hopefully this sets a precedence and
by the way, the ACCC, which I use,
I didn't tell you what that stood for,
it's the Australian Competition and Consumer Commission.
They basically make sure people do the right
things, uh, in the country.
So they do things like check for scams.

(14:48):
They do product safety.
Uh, they're a little more involved than our,
um, you know, consumer protection, uh, in the
United States.
Um, so they, they do a little bit
more than that.
And I think the biggest issue is that
see when you have one case and that
case is a problem, guess what?
Well, then other people start getting worried.

(15:09):
And now this causes things like class actions
to hit.
So I think what they did was bad.
Was it intentional?
I don't think it was intentional, but nevertheless
they are still responsible for, you know, what
they did or didn't do by properly informing
people.
Uh, Mr. Elon Musk comes back again in
the picture.
He recently threatened, this is a trip, uh,

(15:33):
to escalate the situation with the FBI and
the FAA over unanswered emails related to his
companies.
Musk's outburst underscores the growing frustration tech leaders
face when they encounter delays or roadblocks in
their communications with government agencies.
Now, Musk known for his blunt communication style

(15:54):
has indicated that he will take further action
if these critical emails remain unaddressed situation highlights
the ongoing tension between innovative tech entrepreneurs and
governmental oversight.
So, I mean, the thing is this, even
if the government is doing something wrong, you
don't threaten them.

(16:14):
I mean, that's just like, I don't know.
That's just like, can we get a check
on that?
Like that's just not right.
And so he kind of like spurs this
ultimatum is what he does.
Um, and so, you know, is it going
to get, uh, an answer?
I don't know.

(16:35):
Um, and now the federal workers are suing
over Elon Musk's threats to fire them if
they don't explain their accomplishments.
So not only did he, you know, get
huffy and puffy, but now the federal workers
are suing over Elon Musk's threat to fire
them.

(16:55):
Um, this is getting very sticky.
Um, and I think people are starting to
realize that he's creating this powerhouse, but, you
know, people think just because they have a
lot of money that they can act in
an unprofessional manner.

(17:15):
I mean, do they think that it's just
going to get them, you know, better services
and think that they're going to get to
the top?
It might get them some attention, but here's
what's going to happen.
They're going to pay fines.
I knew, um, somebody a while back who
always would call their local police department.
And, um, one time he called the local

(17:37):
police department to report something, but this time,
and I should tell you this in the
past, every time he reported something, it was
always different than when they actually got there.
So he wound up, uh, taking this person
who was very innocent, um, and reported to
the, um, local police department that they were

(18:01):
stalking him and they weren't.
Okay.
They happen to be neighbors in a, in
a, um, like a community, but he had,
um, let's see an ego and a inferiority
complex.
So my point is, is that he inconvenienced

(18:22):
somebody's life for almost an entire year, having
them going to court and all this stuff
and see the state was actually coming after
this person because they believe this person was
a threat.
They were a problem and they have to
respond.
That's the law.
But by the time, almost the end of
the year, I think it was like, November,

(18:45):
uh, November, right.
Just before Thanksgiving, a week or two before
Thanksgiving, several years ago, he decided about a
month before that to countersue this individual.
You know what that did that got the
state to drop their claim against this individual
who was going to be charged because now

(19:05):
they realized it was just a personal, you
know, tip tap, right.
Between two neighbors with a dispute.
And that it was more of a personal
issue and not really a regard for safety
or national concern.
So this person got really annoyed because now,
uh, my friend had hired an attorney and

(19:26):
this other person who was originally going to
be the plaintiff now has to be the
defendant too, because he's getting countersued and he
just really annoyed.
And the court didn't want to grant it,
but my friend told the court saying, look,
you know, I didn't start this whole thing.
And he's like, you're right.
You didn't.
So I will grant you, um, you know,

(19:46):
the right to sue this person.
So my point here is, is that at
the end, when this all was resolved, the
whole thing got completely dismissed because it was
just nonsense, but what they did tell this
person is that if they ever do this
again, not only will they be in contempt
of court, but they'll be in a lot

(20:10):
of trouble with the law.
They could be, um, in prison.
They could be fined because people don't realize
that the law is not a game.
And so what this person was doing was
always reporting things, but it wasn't really causing
people a big issue with just like kind
of reporting them, putting them on file, but

(20:31):
this time he decided to, uh, get a
little more involved and basically, um, fabricate a
case, which I think is just terrible.
So what Musk is doing, he's not fabricating,
but he is trying to use his ego
and his power, his influence, and also things

(20:54):
in the world, like his companies to threaten.
And I think the way he should have
got around this is not to threaten them
and saying, Hey, look, I'm having an issue.
What can you do to help me?
Right.
You don't threaten, um, you know, federal employees.
That is just, that's just a recipe for
a disaster, uh, no matter what it is.

(21:17):
So, um, his outbursts are definitely unprofessional.
And again, just because he's known for this
blunt type of behavior doesn't mean that he
has the right to enact this type of
behavior.
We all know that when we go to
an airport, right, we have to be on
our best behavior.
Um, you know, you cannot use certain language.
If some people do, you, um, cannot make

(21:41):
any threats physical or verbal of any kind,
or they have a fine, you will be
assessed.
And so that lets people know that, Hey,
we're serious about this.
You, you can't joke about this.
And I think that's great.
But I think what Elon's doing in this
case is he's abusing his power.

(22:02):
And now it's just becoming this complete roller
coaster, which is going to come back to
bite him.
And I think it's going to wind up
hurting him if, and before it ever helps
him.
I think if he went there with some
humble pie, uh, he would have gotten a
lot more, uh, support and the United States

(22:24):
is considering a ban on TP link routers
due to cybersecurity risks, a recent investigation, uh,
in revealed vulnerabilities within certain, uh, models of
TP link routers, uh, which could, uh, expose
users to data breaches and yes, cyber attacks.

(22:45):
So, uh, that is a, uh, big problem.
Um, and the potential ban underscores the growing
concern over internet connected devices and their role
in cybersecurity threats, the government is weighing the
risks and will likely implement measures to protect
consumers from potential threats posed by these devices.

(23:08):
Now you might be saying, John, what is
this?
You know, what is this ban and, and
what devices?
So, um, again, they're considering the ban, nothing
has happened yet.
Um, and so it's again, because Chinese government
influence and things like that.
So people have asked me which TP link

(23:31):
routers, uh, may be banned.
Um, so basically on January 18th, um, they
made some speculation on, on this.
Uh, it was actually even in December.
Uh, it was vealed to the United States
government.
It was considering banning TP link routers entirely,

(23:52):
much like Hawaii back in 2019, uh, the
brand might soon all but vanish from the
United States market.
But unlike Hawaii, this might turn out to
be a huge problem because TP link routers
are highly popular across the country.
Now the fate of these routers is still
very uncertain, but they are thinking ahead to
potentially ban these routers.

(24:14):
So again, I think, um, I think we're
being proactive now.
Uh, and I think that's a very, a
very good thing, but the question is, you
know, how do we make sure that vendors
aren't causing problems like many years ago, they
had cameras that were coming out and they're
supposed to have no audio on board if

(24:36):
you order it without audio and they were
secretly putting audio on there to be able
to backdoor in and hear what, um, different
people were saying.
Um, it's a problem.
And so, um, the company's routers are in
65% of American homes and small businesses.

(24:57):
So why is it that people use TP
link?
I'm going to be very honest with you.
It's because they're cheap, right?
Um, in the very beginning, when I started
working with routers back in the day of
Linksys before Cisco had bought them and Linksys
was a fantastic company.

(25:17):
Um, I had looked at a TP link
router.
Okay.
And before I looked at, first of all,
I knew the price was low and, uh,
I just was not happy with the quality,
the workmanship.
And that's a big problem.
Um, and so, you know, when you don't
have a hundred percent protection, that's an issue.

(25:40):
Um, and the ban is more about TP
links ties to China than they're saying a
technical issue, but this is all speculation.
Many cybersecurity experts, um, have agreed that TP
link had security flaws, but so do all
other router companies.
None are perfect.
Um, it's unclear whether the government has found

(26:01):
a new issue that would lead to potential
ban, but it's something they're considering.
The potential ban comes at a time in
Washington when there has been a growing bipartisan
support for extracting Chinese products from the US
telecommunications in an attack revealed in October, uh,
dubbed salt typhoon.
You remember Chinese hackers reportedly broke into the

(26:23):
networks of the United States internet providers like
AT&T, Verizon, and Lumen, which owns by
the way, CenturyLink and quantum fiber.
So, um, I think what this comes down
to the fact is that we might have
to vet these vendors.
Okay.
Um, so how do you protect yourself if

(26:45):
you have a TP link router?
Um, so this is something I think that's
really important to share with you.
So first with any router, always keep your
firmware up to date.
Uh, it's very easy to do.
You can just go to the tab there
and click it.
If you're having a problem, you go to
the website, you can find what model you
have, uh, download the latest firmware, always strengthen
your credentials.
If you never changed the default logging credentials

(27:07):
on your router.
Well, it's probably time you do that.
Whenever you get any router, ladies, gentlemen, you
should always factory default.
Even though like, um, neck gear comes with
a whole set of like, uh, usernames and
password and they're supposedly different for each router,
which I believe they are.
Um, I still don't like the idea that
they're printed on something that's on the box.

(27:30):
Somebody could have taken a picture of that
on the way out.
I mean, it could happen, right?
Um, and so that's important to do obviously
use VPNs.
So I think right now it's purely speculation
about how and why.
And while we're talking about, um, you know,
hacks, I want to talk about the recent
hack that happened just the other day, um,

(27:51):
with, uh, Slack.
And so we use, uh, Slack, uh, every
single day for a lot of my businesses.
And so, you know, what actually happened with
this attack?
Well, let me try to, let me try
to, you know, break this down.
Um, so the cyber threat landscape 2025 is,
is changing, right?

(28:13):
Sophisticated attacks with ransomware, social engineering, and AI
powered cyber crime, obviously being on top.
But, um, I think what happened here and
this, again, this just happened literally in February.
Um, the, the Slack breach, uh, that's been

(28:35):
happening is allowing, um, bad actors all over
the world to be able to access other
people's Slack's accounts.
Now you might say, John, what's the big
deal?
Um, well, whether it's, um, you know, whether
it's something that you're using for your business
or, and you're using confidential information to be

(28:57):
passed, or you're just sharing some personal notes,
um, it's a problem.
Um, and so when we think about this,
a lot of people think that free software
is no good.
Well, there's a free version of Slack and
there's a paid version of Slack.
So we use both the paid and we

(29:18):
use the free.
Um, what I can tell you about this,
you know, the recent, um, the recent hack
on Slack, uh, the other day is that
they basically went after some cookies.
Okay.
And Disney has says they're going to stop
using Slack following the recent, uh, following the

(29:39):
recent, uh, attack.
I think that's a very, um, important thing
to, uh, acknowledge.
And so, um, you know, what is it
that's going on and how did Slack get
attacked, uh, the other day?
Well, let me see if I can give
you the high level, uh, overview of how

(30:01):
Slack got hacked.
The hackers, uh, claimed again to access, uh,
purchase stolen cookies.
Um, people say, can Slack spy on me?
So Slack tracks several key data points about
you, but not all data tracking is equal.
So not even within a single organization.
Fortunately, Slack breaks down exactly how they use

(30:23):
your data.
So that's great.
But the question really comes down is Slack
was down thousands reported being down.
And this was a big problem.
Slack's tech dashboard for support issues with users
connecting or loading communication platforms at 1027 AM,
um, just the other day.

(30:43):
And so just four and 39 people were
reporting issues with Slack around 3 PM on
down detector, a website that tracks outages across
platforms based on user reports down from the
peak of about 3100.
Now that was 1140 AM at 1226 PM
Slack said its investigation is still in progress
with regard to, uh, depreciated functionality for Slack.

(31:06):
Uh, despite reports that Slack was functioning for
more people, Slack said at 305, it will
still be working to restore the functionality.
Slack said it had identified the cause of
the issue, but the issue is still not
fully resolved.
And some users may still have problems.
So the question is, um, what's Slack doing?
So no system is a hundred percent secure,

(31:27):
right?
Whether we're talking about Slack, WhatsApp, et cetera,
but how do you protect yourself?
So it's really easy.
One of the easiest things you can do,
uh, to protect yourself on Slack, uh, is
to use two factor authentication.
So I know that sounds like something that's

(31:48):
a pie in the sky, but it's not.
So in order to, um, activate two factor
authentication, whether you're a paid or a non
-paid user, all you do is you go
up to your, um, Slack program.
And when you go to your, we call
it your workspace.
Basically you click on the workspace, you get
mobile workplace, you click on the workspace that

(32:09):
you want.
And then what you do is you will
see there, there is a little, um, there's
basically a little, um, icon there at the
top.
And then you just go, you could, you
could actually go to home and then, um,
you can go right to where it says,
um, basically, uh, work settings, right?
You're going to edit, you're going to edit

(32:30):
your, your, your work settings.
And so, um, it's very, very easy to
do.
And what happens when you do that is
you're going to go into your account and
then you're going to go into authentication, the
authentication tab.
Once you go to your authentication tab, um,
you will then turn on two factor authentication.
It's going to ask you.

(32:50):
So basically it's under file settings and administration,
and you're going to go to where it
says workspace settings.
Once you click on that, you're going to
be greeted with settings, permissions, authentication attachments, click
on the authentication, uh, link at the top.
Uh, once you do that, it's going to
say here, configure authentication modes, upgrade.
You don't have to upgrade two factor authentication

(33:11):
for your workspace.
Okay.
You're going to click on that.
And once you click on that, you're going
to basically see below what it's going to
say.
All members are required that you're going to
click on enable.
What will happen is, uh, roughly, uh, about
24 hours from when you enable it, everyone's
going to be required, uh, to use it.
What you'll then notice is first thing that's

(33:32):
going to happen is it's going to ask
you to put your password.
If you haven't put your password, you may
have to put your password into the, uh,
thing.
Otherwise you're going to reset it.
Once you reset it, you're good to go.
And then, um, what you're going to find
out, you have to go back in again,
click on disable, enable, uh, two factor authentication.
Once you do that.
Now, when you go back to your Slack
space, that's what's going to happen.
Uh, you're going to find out that you're

(33:53):
going to have to relog in.
No big deal.
Um, but once you log in, you're actually
going to get a message telling you that
through a thread, a secure thread that you're
going to need to enable two factor authentication
because your, uh, workspace administrator has, um, required
that.
Okay.
You click on the link.
Uh, I typically use Microsoft Authenticator.

(34:13):
You can use choose SMS. And then what
you do is you go to your authenticator.
You go to personal, you scan the QR
code.
Uh, then it's going to ask you to
put in the code that's come up on
your screen.
Then it asks you if you want to
add your cell phone number in case that
device gets lost.
And maybe you unfortunately didn't back up your
Microsoft Authenticator.
But that's a story for another day.
Always back up your Microsoft Authenticator because it's

(34:34):
a real pain.
Uh, if you don't have all these codes
and getting back into these programs, let's just
say won't be a very fun project.
So what that does is make sure that
no one can get into, uh, the Slack
workspace that I've secured, uh, when two factor
authentication is on.
And it is completely free.
And I recommend everyone, if you're using Slack

(34:54):
or any other platform, do enable two factor
authentication, because even if somebody has a stolen
cookie, they will not be able to get
into, um, the, um, messaging platform, whatever it
is without that two factor code.
So I just thought I would share that
with you.
And, um, I think that's the real thing
is that a lot of people trust these,

(35:15):
uh, things like the password and logging with
email.
And you just can't do that anymore.
I mean, unfortunately, data is being hijacked all
the time.
So I hope you guys will take my
advice and definitely do that.
Uh, and on another note, basketball players are
starting to use a Palm device that they're
walking around, um, when they're off the courts.

(35:37):
It's a Palm cooling device to enhance their
performance during high intensity games.
The devices are designed to cool down players'
palms, helping to regulate body temperature and reduce
the risk of overheating.
This innovation is part of a broader trend
in sports technology where athletes are increasingly turning
to the advanced wearables to optimize the performance
of recovery.
And it's not just being used off the

(35:57):
courts, it's being used on the courts.
So this development could pave the way for
similar technology to be used in other sports,
helping athletes stay in peak physical condition.
So you might ask, you know, what is,
because in more detail, what is this cooling
device, uh, that basketball players, um, are using?
And so, um, it's a Palm cooling device.

(36:20):
They call it a Narwhal.
Um, and for their visual similarity to protruding
tusks of a, a Narwhal whale, uh, they're
made by Apex cooling labs.
One of several companies manufacturing these types of
devices, all which are, um, able to rapidly
cool an athlete's palms.

(36:42):
So, um, definitely a piece of interesting technology,
uh, that's, you know, being put out there.
And so, um, the question you might be
asking is, you know, um, basically how much
these things cost?
Well, that's a good question.
Uh, the price, um, you know, sports people,

(37:04):
they, they buy pretty much anything they need.
So they, they have price ranges anywhere from
$324 and up, and then they have interest
repayments and stuff like that.
But basically, um, it's, it's a, it's a
charging bar path is the best way to
explain it.
And so this cools your palm, uh, very,

(37:26):
very quickly.
Um, and, uh, many physical therapists are starting
to recommend this, but we haven't had enough.
Uh, and there's some devices that are even,
uh, close to a thousand dollars.
They have one now called a cool mitt.
But the question is, do these things really
work or are these things just a fad?

(37:46):
I don't know yet because again, they just
started using them.
Um, I mean, I'm sure we're going to
hear whether they're working, but the fact that
they keep using them tells me they're probably
helping.
But I'd like to see if there's any,
uh, negative effects, uh, that are occurring because
of these use and how long do these
last?
And here's what I think you're going to
find really cool.

(38:07):
Quantum computing has made a major breakthrough with,
uh, the achievement of quantum teleportation.
This teleportation, um, technology, uh, allows quantum information
to be transferred instantly across vast distances and
has the potential to revolutionize fields such as
cryptography and communication.

(38:30):
Although still in its early stages, quantum teleportation
could lead to faster, more secure data transmission
and often up to new possibilities for technological
advancements in computing and beyond.
Now, I think a lot of people don't
realize that quantum technology uses qubits.

(38:51):
Okay.
Qubits is different than a regular bit.
So a regular bit is just a bit
and it could be either on or off,
zero or one.
A qubit can actually be on or off
or on as well.
Um, and so, um, it's, it's important.

(39:12):
Uh, it's very important that we understand that.
Um, so hopefully, um, you know, you'll understand
like, you know, what's going on.
And, uh, I think, um, you know, it's
important that you understand, uh, what had happened.

(39:32):
Um, it's something that people have to, um,
understand.
Uh, people don't realize what this is doing.
Um, I think a lot of people don't
realize it.
Um, and most people don't realize how this

(39:54):
works.
And so if they don't understand how this
works, then what does it mean to you?
Well, I think it means that you have
to embrace this new technology.
All right.
You have to embrace this new technology.
And this new technology that's out there, um,

(40:15):
is something, um, that many people don't understand.
They have no understanding, uh, what this means
and they get lost in basically in, in
the, uh, in the pathway.
So when we have new technology out there,
everyone always wants to jump on board and

(40:37):
use it.
But I think what's really important, because many
people just want to get their money, if
they're the ones creating it, we've got to
make sure that first of all, the use
case lines up and that the data privacy,
um, is in check because we're finding more
and more technology that's getting released so quickly,

(40:58):
but it can't go anywhere because there's been
a breach or there's been the technology issue.
Um, and remember those fires that we heard
about the wildfires, uh, there, well, the early
wildfire detection tools have proven to be ineffective,
uh, in, uh, preventing all fires, despite technological
advancements.
While these tools are designed to identify fires

(41:19):
easily and reduce response times, they have not
yet been able to prevent the spread of
all wildfires.
This limitation highlights the complexity of wildfire management
and the need for continued innovation and research
in the field.
As climate change, uh, exacerbates the frequency and
the intensity of wildfires effectively early detection tools

(41:40):
will remain a critical part of the solution.
So Apple invites, uh, app now, uh, which
is this app they have, and it requires
iCloud plus to host events.
Um, you now have to have a subscription,
a move that reflects the company's ongoing shift
toward premium services.
iCloud plus is a Apple paid subscription service

(42:02):
that offers additional features, including more storage space
and enhanced privacy protections by making iCloud plus
requirement for hosting events.
Apple is incentivizing users to upgrade their services,
which could lead to increased revenue while also
providing a more seamless and secure event hosting
experience.
But I don't like the way they're doing

(42:22):
this.
I just think they should have a free
version.
I'm not really happy with that.
And breeze Lou has removed, um, some videos
that are not of appropriate nature from Microsoft
platform.
Um, following pressure from the public regulators, the
decision to take down the videos reflects the
increasing scrutiny tech companies are facing when it

(42:43):
comes to managing content that let's just say
it's not G friendly or family friendly.
Um, and, um, it's, um, harmful content in
many cases on the platform that could not
only damage the person's reputation, but the company's
reputation overall lose actions are a part of

(43:03):
a broader effort by Microsoft to ensure that
their services remain safe.
And as I said, family friendly, particularly for
the younger audience and ladies and gentlemen, the
U S medical research, uh, foundation is facing
significant challenges due to a freeze on federal
funding.
The government's decision to pause funding has led

(43:24):
to delays in critical medical research projects, slowing
down the progress of new treatments and innovations
in healthcare.
This situation highlights the importance of consistent funding
for research and development, especially in the medical
field where advancements can have a profound impact
on the public health.
So, um, you know, when we think about

(43:46):
technology, right.
And we think about computers and we think
about the fact that when we go to
buy something today, right, we have a choice.
There are actually three different types of computers
that I want, I want to talk about.
So there's one type of computer out there.
Um, you're probably very familiar with, and that's
actually, um, your portable, uh, mobile device.

(44:09):
Now, I don't know if you know this
or not, but that actually is a computer.
A lot of people say, Oh, John, that's
not a computer.
That's a, that's, that's a, that's a phone.
Well, I know what you're saying.
And I know you're probably telling me, Hey,
John, like it doesn't make sense, but I
have news for you.
Um, the iPhones of today, okay.

(44:32):
Are actually, uh, more powerful than the computers
were a decade ago.
Now I know that sounds like, you know,
really crazy, but there's something, um, that is
important to understand the computing industry.
Uh, most people don't realize has evolved a

(44:53):
lot quicker than the transportation industry.
And, um, we often joke about this.
If the transportation industry increased as much as
the computing industry, we probably would be able
to buy cars for maybe $500 or less,
right?
Um, the agricultural and the industrial revolution actually

(45:19):
helped transform society's, uh, needs computers.
And it led to a relatively recent information
revolution that we've all been experiencing.
Now, computer improvements have led to a lot
of things happening, including the fact that many
applications, um, are being developed on cell phones.

(45:39):
So we have three different types of computers
I want to talk about.
I think this is, this is, uh, important
to share with you.
So we have, um, we basically have four
when I call it.
So we have a PMD, a personal mobile
device.
We also have, uh, a personal computer that
could be your Mac, that could be your
PC, your laptop, et cetera.
So it's a computer designed for a person
or individual to basically, um, check their email.

(46:04):
Uh, it has a graphic display.
It has a keyboard.
It has a mouse.
I can have a touchscreen if you'd like.
Um, and it's basically there so that you
can perform, uh, different things such as word
processing.
You can do payroll on it.
You can do, uh, searching the web.
You can do email on it.
And there's other programs you can load too.
So that's a personal computer.

(46:25):
Then we have something called an embedded computer.
An embedded computer is, um, it's a computer
that's inside another device and it's used for
running one specific application or collection of software.
Uh, one example is a pacemaker, um, where
the device is sending out electronic, um, pulses

(46:50):
to the heart, uh, to keep it alive.
So that's one type of, um, you know,
of, of a computer.
So it's called an embedded computer.
We also have a computer called a server.
Uh, it's a computer used for running large
programs for multiple users, often simultaneously and typically
access only via a network.

(47:11):
So of course we have another computer.
It's not, it's around, but we don't hear
about it every day.
It's actually called a supercomputer.
You probably remember, uh, the Cray computer, um,
uh, that first started.
Um, so a home computer, you know, is
kept on a desktop and it's used by
family members for emails, web browsing, social networking,

(47:31):
and even watching movies.
That's what we call a PC.
A computer may be in an Amazon building
that's accessed by thousands of people for perhaps
online shopping.
Um, well, that would be an example of
a server.
A computer, as I said to you, that's
in a cardiac pacemaker, or maybe even a
computer that is in, um, let's say, um,

(47:54):
a little gadget you have like a little
iPod, um, nano, or maybe something like, um,
a mini, uh, device that can, uh, retrieve
different health biometric data that could be, uh,
called an embedded computer.
So, um, a computer may be at a
federal laboratory that executes lots of algorithms continuously.

(48:18):
That's a server.
So we also have something called post PC
error.
So we talked about personal mobile devices or
PMDs.
They're small wireless devices that you connect to
the internet and they rely on batteries for
power and software's installed by downloading apps typically.
Uh, and a lot of people have them
either, it's either a smartphone or it's a

(48:39):
tablet.
Now there's something called, uh, the post PC
error.
Now, what is the post PC error?
So that's talking about the fact, I don't
know if you guys know this, but, um,
it refers to today's situation where, um, computers
are not the, uh, most prevalent thing being
purchased.
It's actually things like mobile devices and phones.

(49:02):
I don't know if you guys know this,
but there was, oh gosh, in around 2012.
And those goes back many years.
It's about 600 million smartphones that were sold.
That's a lot.
I mean, that's a lot of phones, um,
a lot of phones and they do more
than just make phone calls.
Uh, and so, you know, they can do

(49:24):
a lot of things in 2024, according to
canalysis research, the global smartphone market grew 7
% in 2024, reaching 1.22 billion units,
making a rebound after some years where it

(49:44):
had dropped a little bit.
So these are important things to understand.
And then we also have things like, you
know, um, cloud computing, right?
Where we would particularly use, um, let's say,
um, your browser, but the application, um, basically
would use, um, you know, lots of servers

(50:08):
in a giant warehouse.
So the processing's running there, but you're using
your browser, Firefox, um, Brave, uh, Explorer, um,
um, or a variety of other ones, Safari
to actually run the application.
Um, we have something called software as a
service, uh, which is really what this refers

(50:30):
to.
And so software as a service is where
we actually have computers that are doing all
the processing at another end.
And then we're just running them locally through
like a browser or something like that.
So we also noticed now is that as
computers are evolving around, I think it was

(50:50):
right around 2024, uh, we're going to notice
that speeds actually, uh, the frequencies, uh, started
slowing down.
Why was that?
Well, it's because of power and there was
a huge thermal overload.
And so they kind of abandoned, uh, you
know, growing the frequencies so, uh, quickly.

(51:12):
And now they work on things like parallelism
and, uh, mitigating the power and stuff like
that and more cores.
So we have more cores on a processor.
So for example, a multi-core microprocessor is
not a single processor.
It's a chip with multi processors on it,

(51:33):
and they're running simultaneously.
Now, when somebody says they have a computer
and they're running programs simultaneously, they really are
not.
If it's not a multi-process, multi-core
processor, they're actually time slicing.
So each program is getting so much sort
of peers like they're all running simultaneously, but
they're not.
So, uh, developers are now moving to multi

(51:53):
-core processors for these reasons.
And so we know, ladies and gentlemen, that
in the industry for a very long time,
power has been, it's been a huge, huge
issue.
Uh, if it wasn't, um, Intel and a
lot of these companies right now, you know,
what would be happening?
They would be expanding and they would be

(52:13):
making processors, okay, that were a lot, um,
let's say, um, more powerful by use by
using more power, but we don't have the
method to actually, um, cool these down very
efficiently, which is why we've moved to other
methods like parallelism and multi-core processors and

(52:35):
things like that.
In 1951, we started with vacuum tubes, which
got very hot.
1965, we went to transistors.
Okay.
1975, we went to integrated circuits.
1995, we went to very large integrated circuits,
which had lots of, um, them on board.
And then 2020, we had the ultra large
scale integrated circuits.
So, um, I think what's important to understand

(52:59):
that is also to know that from the
1970s to the 1990s, uh, dynamic random access
memory capacity has quadrupled over three years.
Now, DRAM capacity today, uh, doesn't continue to,
uh, quadruple anymore, ladies and gentlemen, it actually
has slowed down and it doubles rather than

(53:19):
quadruples every two to three years.
Um, the last important point that I want
to share with you guys is how things
are made.
So, um, we start when we talk about
chips, they are made, uh, with silicon, which
is a natural element that is a semiconductor.
It can't totally, uh, conduct, um, so, um,
different chemicals need to be put on it

(53:40):
so that it can conduct.
A semiconductor is basically a substance that does
not conduct electricity well, which is why we
call it a semiconductor.
So we start with something called an ingot.
Okay.
An ingot is nothing more, it's a silicon
crystal ingot, and it's a rod that's composed
of silicon crystals between about eight to 12
inches in diameter and about 12 to 24

(54:01):
inches, uh, long.
Typically a slice from a single ingot is
no more than 0.1 inches thick, and
it's used to create chips.
How does it start?
It's really simple.
Um, they start with the ingot, um, it
then gets sliced, uh, then you have the
blank, very thin wafers, then about 20 to
40 processing steps.

(54:21):
After those 20 to 40 processing steps, um,
we have our, uh, pattern wafers.
Then we go through our wafer tester.
Uh, the wafer tester checks for any defects
and then, um, they are diced into dyes.
After they are diced into dyes, um, they

(54:41):
are basically, they're bonded to the dye into
and then into the package, and they're packaged
in the dye, and then a person tests
them one more time, and then they're shipped
to the customer.
So, um, there's a lot in, in making
a chip.
I thought it was pretty interesting.
So when they check for a defect in
a chip, they're actually looking for a microscopic

(55:01):
flaw in a wafer, uh, or in a
patterning step that could have gone wrong.
Uh, the individual rectangular sections are cut from
a wafer, more informally known as chips.
So silicon is a common element found in
sand.
Um, the manufacturing process begins with a, uh,
silicon ingot, that's I-N-G-O-T,
and the blank wafer on goes 20 to

(55:23):
40 chemical processing steps to create transistors, conductors,
and insulators.
A wafer tester evaluates the pattern wafer for
the presence of any defects, and after the
pattern wafers chopped them into dyes, the dyes
are then packaged.
So, um, I think a lot of people
don't realize the amount of effort that goes

(55:43):
into actually making, um, you know, a chip.
Um, people think that if you have high
volumes, that it's going to be cheaper, and
it is on the volume, but not on
the design process.
Of course, by making more chips, it does
lower the total cost of manufacturing and manufacturing.

(56:06):
And research and development design.
So engineering and development costs are, are high
and, uh, they're independent of the volume, but
the development cost goes lower because with a
higher volume, that happens.
A lot of people also think that high
volume parts always have smaller dye sizes than
low volume parts, and therefore have higher yield,
uh, per wafer.

(56:28):
And that's actually false.
High volumes can make extra investments to reduce
the dye size by, say, 10%, but a
good economic decision, but high volume parts are
not always smaller.
So, um, that's a lot, right?
And hopefully that gives you a little bit
of an understanding of how, um, you know,

(56:50):
computer chips are made.
And another important thing I think we have
to understand is when we talk about computers,
we talk about a couple of things.
First of all, we talk about the response
time, also known as the execution time.
And this is what's required for the computer
to complete a single task, including maybe a
disk access or memory access, IO activities, OS

(57:10):
overhead, CPU execution time, et cetera.
The, so response time equals the execution time.
The throughput, also called the bandwidth, um, measures
the, basically the performance, the number of tasks
completed per unit of time.
For example, if I had, uh, a bakery
and if a tray, uh, goes into, um,

(57:32):
the oven, let's say, and I put the
tray in, but let's just say one trade
goes in the oven.
Okay.
Uh, and it just say, let's say it
takes, I put the tray in, but each
tray, let's say has one, um, let's say
muffin on it.
I'm just going to make it very simple.
One muffin goes in there.
So it takes one minute, let's just say,
or let's say it takes 10 minutes to

(57:52):
bake that muffin.
So my actual, um, basically my actual, um,
response and execution time is going to be,
um, basically the 10 minutes.
So if I have, let's say I put
in, I could put in 10 muffins at
one time.
It takes one minute to do, but I

(58:15):
can actually do, uh, 12 or 24 at
a time.
It still takes the, the response time is
still 10 minutes, but my throughput, um, okay.
Um, and my, and basically my, uh, going
through is going to be either I get
24 muffins.

(58:36):
So that's really, really pretty cool.
I hope today's show has brought some enlightenment
to you.
I hope it shared some interesting caveats about
technology, where we're going and how, uh, different
things we do are very important.
Next week, I'm going to dissect the iPhone
a little bit and share with you how
the iPhone's made, because I think in addition

(58:57):
to giving you some great tips, I want
to make sure that I'm giving you stuff
that is going to not only educate you,
but give you a greater appreciation to how
things work.
We call it architecture.
I'm going to go more into that on
our next show.
Again, I am John Seymour, sir.
Entrepreneur.
It's always such a privilege.
Pleasure and honor to be with you guys

(59:18):
on these amazing shows.
JMOR Tech Talk, inspiration for your life.
You know, ladies, gentlemen, I'm going to catch
you guys on the next show.
Please do check out believemeachieved.com and I'll
see you guys on another show real soon.
Take care.
Advertise With Us

Popular Podcasts

Dateline NBC

Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

24/7 News: The Latest

24/7 News: The Latest

The latest news in 4 minutes updated every hour, every day.

Therapy Gecko

Therapy Gecko

An unlicensed lizard psychologist travels the universe talking to strangers about absolutely nothing. TO CALL THE GECKO: follow me on https://www.twitch.tv/lyleforever to get a notification for when I am taking calls. I am usually live Mondays, Wednesdays, and Fridays but lately a lot of other times too. I am a gecko.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.