Building on their microservices talk a year ago, Pivotal Cloud Foundry’s Matt Stine and Pivotal Perspectives host Simon Elisha sat down for a talk on…
Western Editor Matthew Keevil sits down with Joe Mazumdar from Exploration Insights (https://www.explorationinsights.com/) for a wide-ranging discussion on the resource sector. Topics include the recent resource estimation troubles for Orezone Gold (TSXV: ORE; US-OTC: ORZCF) at the Bomboré gold project in Burkina Faso, West Africa. What’s up with those resource estimates and 43-101 reports?
We talk Pretium Resources’ (TSX: PVG; NYSE: PVG) Brucejack gold project in northwestern B.C. and Nevsun Resources’ (TSX: NSU; NYSE-MKT: NSU) Bisha operation in Eritrea. What is the deal with zinc markets?
Bonus topics: Managing investment risk, where’s the upside, and more!
Macro commodity rundown: 1m24s Orezone’s resource troubles: 3m55s Thoughts on 43-101s and resource estimation: 11m35s Pretium’s Valley of Kings project: 13m30s Managing investment risk: 16m18s Finding value in resource stocks: 17m57s Nevsun’s Bisha mine and zinc markets: 20m51s Investing in emerging South American markets: 23m12s Mergers and acquisitions trends: 25m25s
Stories referenced in this episode:
Nevsun sees bright future at Bisha: http://www.northernminer.com/news/nevsun-sees-bright-future-at-bisha/1003768267/
Nevsun trumps Lundin bid for Reservoir: http://www.northernminer.com/news/ne…
Original video: https://soundcloud.com/northern-miner/episode-29-risk-and-reward-ft-joe-mazumdar
Downloaded by http://huffduff-video.snarfed.org/ on Fri, 16 Sep 2016 16:18:29 GMT Available for 30 days after download
The Gold Chronicles: September 8th, 2016 Interview with Jim Rickards and Alex Stanczyk | Physical Gold Fund
Jim Rickards and Alex Stanczyk, The Gold Chronicles September 8th, 2016
*Jackson Hole Meeting Analysis
*Difference between 3.5% growth and 2% growth compounded over 20 years is the difference between a wealthy nation and a poor one
*Now looking like a rate cut by the Fed is more likely than a rate hike
*Removing cash from monetary system is now being discussed at the highest levels as a path forward to allow the US to implement negative interest rates
*Update to “War on Cash” scenario
*G20 Meeting Analysis
*China’s snub against President Obama was the 2016 version of the Kowtow
*This is a very significant G20 summit, the Hangzhou Consensus are the new rules of the road for the international monetary system
*IMF Quota being reviewed in 2017 and expect emerging market voting shares to be adjusted
*BRIC’s expected to have 15% voting power by end of 2017, which shifts the balance of influence within the IMF away from the US
*Long term effect could include rebalancing the SDR currency ratios, removing use of USD for purchase of oil, and other measures which would reduce reliance on USD as world reserve currency
*Introduction to coming war on gold
*Once the “war on cash” is over, it is expected attention will shift to gold, and government will shift attention to gold
*Buying gold may become increasingly more difficult from a regulatory standpoint in years to come
*Several non-US Central Banks are buying billions of USD worth of US stocks
*Expected longer term economic effect of SDR being re-weighted with Chinese Yuan
Learn more about Jim Rickards latest book, The New Case for Gold at http://thenewcaseforgold.com/
You can follow Alex Stanczyk on Twitter @alexstanczyk
You can follow Jim Rickards on Twitter @JamesGRickards
You can listen to the Gold Chronicles on iTunes at:https://itunes.apple.com/us/podcast/the-gold-chronicles/id980027782?mt=2
You can Listen to the Physical Edge on iTunes at:https://itunes.apple.com/ca/podcast/physical-gold-fund-podcasts/id1056831476?mt=2
You can access transcripts of our interviews at:http://www.physicalgoldfund.com/category/transcripts/
You can subscribe to our Youtube channel to access these interviews and more at:https://www.youtube.com/channel/UCXRWzw0vaNgCwo7nTMEAwkA
http://www.afecustodial.com/download/audio/jr-september-2016.mp3Podcast: Play in new window | DownloadSubscribe: iTunes | Android | RSS
Podcasts for Designers and Developers. Level up your career.
The O’Reilly Data Show Podcast: Michael Li on the state of data engineering and data science training programs.In this episode of the O’Reilly Data Show, I spoke with Michael Li, cofounder and CEO of the Data Incubator. We discussed the current state of data science and data engineering training programs, Apache Spark, quantitative finance, and the misunderstanding around the term “data science.”Here are some highlights from our conversation:
Wall Street quants and data science
When I think about finance, I often think of it like data science 1.0 or maybe even data science 2.0, and what we call data science now is really more like data science 2.0 or 3.0. It’s the next wave of data science, so it means that when people were practicing data science on Wall Street, they had much more primitive tools in the ‘80s and the early ‘90s than what we’re using now, so they were kind of scraping by. But because they’ve been practicing data science for so much longer, there’s just so much more of a built-up understanding of how this works. …A lot of what I was doing at Foursquare was taking basic things that I learned on Wall Street, applying them toward monetization, and it did pretty well. I think there’s a lot that data science can learn from finance and vice versa.
Data science for humans and data science for machines
There is a distinction between data science for humans versus data science for machines. I think that a lot of people just think, ‘Oh, they’re data scientists. They just look at data,’ but it really depends. The kind of person you’re looking to hire really depends on whether the output of his or her analysis is meant to be given to human decision makers or whether that output is meant to be handed to a machine that will then process everything. I did a little bit of both at Foursquare, but the two approaches required very different skill sets. For one of them, I have a metric, and I need to improve that metric. Let me just turn this dial and make it as complex as possible. For the other one, you have to realize that a human has to understand this, so you have to make this model simple enough that humans can look at it and really wrap their minds around it. I think this distinction is very important.
Apache Spark training
We talk to a lot of hiring companies. We always want to understand what’s interesting to them. Just to give you a few examples, when we started the Data Incubator, I think Spark still wasn’t a very big thing, but now we’re seeing this kind of huge demand for Spark, and that’s one of the things that our corporate training partners are really asking for. It’s one of our most popular modules.
…Last year is about when we started building out the Spark courses, but we’ve really seen that take off in the past year. … It’s been great to see Spark evolve to the point where we’re collaborating with Databricks to do trainings and see this huge demand in industry.
5 secrets for writing the perfect data scientist resume
3 ideas to add to your data science toolkit
Accelerating Spark workloads for GPUs
Structured streaming comes to Apache Spark 2.0
The O’Reilly Security Podcast: Modern server hardening, institutional inertia, and new approaches to desktop security.In this episode, I talk with Kyle Rankin, vice president of engineering operations at Final, a credit card startup. We discuss old versus new approaches to server hardening in light of the cloud, how institutional inertia thwarts change, and the new security-minded desktop OS Qubes.Here are some highlights:
Organizational inertia and security
To me, a pretty big problem is that there are a lot of outdated approaches that just haven’t been brought up to date. I think the biggest barrier to change is inertia. If you go to a lot of orgs that have had systems around for a while, getting everyone to generate an SSH key and use it is one big thing. Another thing is, a lot of orgs have all these other security practices, like sharing group accounts, for instance; all of the developers may have one role account called ‘developer’ on all machines, and they just share the password. What ends up happening, is that you have individual pockets of people in the org who know what the right thing to do is and are frustrated that they’re not allowed to do it—a lot of times it sounds like this is a political problem. You’ll see a lot of boards that dictate password rotation, and they will demand it as a best practice, even though there’s a lot of research that shows it’s not. If you’re someone who’s in that org, and you’re not a decision maker, then you end up with things like this. There are a lot of legacy systems out there, and it’s a lot of work to update them.
The silver lining of shifting to the cloud
Many people have operated under a mistaken assumption that their internal network was secure already, and for decades, they focused on the perimeter. Then someone’s internal work station gets owned, and it’s game over. The cloud forces you to start with the assumption that the perimeter network isn’t the only network to be concerned about, that you also have the question of the internal network. You start with that assumption, and you start with the expectation that the network is somewhat hostile. Then you bake in better practices. A lot of orgs, for instance, will just use TLS externally, and won’t use it internally. In the cloud, it’s particularly important because if you don’t have your security group rules, for instance, set up correctly, you can potentially have some hostile asker pretend to be one of your servers. But if you use TLS for all of your communication, you know it’s encrypted which is nice, but more importantly, you can authenticate the server and client to each other. I know that when I’m talking to something else in the cloud, I’m talking directly to that server and not someone in between.
A new approach to desktop security: Qubes
I heard about Qubes a year or two ago. It’s essentially a way to isolate what you do on your workspace into a bunch of different VMs. I had some friends in security that had been doing that the hard way for a long time, where if they wanted to go to a bank, their bank website for instance, they would fire up a VM specifically for that purpose. I had been following a hardware startup called Purism that’s creating these open source hardware laptops that have some interesting security features. One of them is that they ship with Qubes already installed by default.
One of the big challenges with Qubes is that it heavily relies on virtualization features of your processor—you have to have well-supported hardware for it to work well. It sort of takes you back to the old days of Linux, where you had to have it installed and have people help you get it set up.
I started using it personally and quickly saw how powerful it would be for my work use. For instance, at work, what it allows me to do is tightly segment different VM’s for different purposes and colorize them. Instead of having a bunch of small windows that are all different versions of a Linux desktop, it’s just the application window you see. It feels and acts a lot like a regular Linux desktop; the difference is, I may have three different browser windows open at one time, and the borders around those windows may be red or green or blue depending on how much I trust that VM. For instance, I have an untrusted VM that has no personal files on it, and I just use it for everyday web browsing. If someone were to send me a link to look at, I would click on it and open it in my untrusted web browser. Because there are no personal files in that browser, if for some reason it were a malicious link, there’s nothing for it to compromise; it’s just the VM. If I ever suspected it were compromised, it’s relatively easy to just turn it off, erase, and create it again.
If someone sends me a PDF right now, Qubes makes it easy to integrate this into an email client. You send me a PDF attachment, and I can automatically open it in the disposable VM. If that PDF were malicious, it just compromises that temporary VM, and when I close the window, everything is erased. It allows me to calm down a little bit as far as my operational security on my desktop.
Drew and James open the show quickly with a brief chat but then jump right into meetups. The guest this week is Adam Dymitruk, the Founder and CTO of Adaptech Solutions, organizer of the Git Help and 0-tech meetup, Linux Desktop Meetup, and the DDD/CQRS/ES Practitioners meetup!
SE-Radio Episode 268: Kief Morris on Infrastructure as Code
Filed in Episodes
on September 13, 2016
• 0 Comments
Kief Morris, cloud specialist at ThoughtWorks and author of the recent book Infrastructure as Code, talks to Sven Johann about why this concept is becoming increasingly important due to cloud computing. They discuss best practices for writing infrastructure code, including why you should treat your servers as cattle, not pets, as well as how to monitor your cattle. After examining the benefits — security, auditability, testing, documentation, and traceability — the show wraps up with a look at how to introduce infrastructure as code to organizations.
The Infrastructure as Code book
Google Site Reliability Engineering book
DevOps Weekly Newsletter
Testing infrastructure configuration with NMap
Testing infrastructure configuration with ServerSpec
http://traffic.libsyn.com/seradio/SE-Radio-Episode-268-Kief-Morris-on-Infrastructure-as-Code.mp3Podcast: Play in new window | DownloadSubscribe: iTunes | Android | RSS
Double Your Freelancing Podcast, Episode 60: Todd Tresidder on Financial Independence - Double Your Freelancing
My guest today is Todd Tresidder, a former hedge fund manager and founder of FinancialMentor.com. He is a personal finance and investing expert coach who t
Modern Web » Blog Archive » S03E06 - React Router, HistoryJS, State Management, Webpack vs Rollup, and more (React Rally Edition)
Modern Web is a podcast that explores next generation frameworks, standards, and techniques. Visit http://modern-web.org for more.