Welcome to Help 4 HD Live! We are proud to broadcast credible information and education to the Huntington's disease community on a weekly basis. Help 4 HD Live! broadcasts every week providing vital information and inspiration to our Huntington's community. We have been blessed to interview many of our JHD/HD researchers, medical professionals, care providers and the pharmaceutical industry for six years. Join our Hosts, Katie Jackson each week for incredible programming and don’t forget to ...
…
continue reading
Hd Research Podcasts
Champions for HD is a nonprofit that fights to aid families and cure Huntington's Disease one family and one voice at a time. Our vision is to fight HD by contributing funds to local research while aiding HD families in need. This podcast will bring you stories from champions within the HD community as well as updates from the professionals in the field. This is a safe place to share freely and support one another. No one fights Huntington's Disease alone.
…
continue reading
Interview series with the people working in Huntington's disease research and treatments
…
continue reading
WeHaveAFace.org Inc. has created "WeHaveAVoice" Radio for the Huntington's and Juvenile Huntington's disease community. It is time for the community to speak out...speak up! We must openly share what all of us in the Huntington's community experience on a daily basis! Removing the stigmas and broadening social awareness and acceptance is paramount! Visit: www.WeHaveAFace.org/Radio for more information.
…
continue reading
I pick a topic I want to know more about and dig into it for a year. 2017 is all about space! I'll look at anything that sends me down a research tangent. I do take requests, I don't keep it formal, I do my research, I don't like describing complex math but I do try. Wander with me into the cat’s-cradle tangle of society, history, science, and anything I thought was cool to mention.
…
continue reading
"HD Reality" is a podcast hosted by Courtney Cable, a trained life coach who shares practical tools and coping strategies to help individuals, their loved ones, and anyone grappling with the possibility of Huntington's Disease. With expert advice and inspiring interviews, the podcast explores the emotional rollercoaster of HD and provides lasting solutions for easing the pain it brings. Tune in to gain a deep sense of connection with the HD community and empower yourself with the knowledge a ...
…
continue reading
Host Gatley Stone interviews some of NC State’s most distinguished professors to learn about their research and how they made it to where they are today. This series is made possible thanks to NC State's student radio station, WKNC 88.1 FM HD-1/HD-2.
…
continue reading
ESOcast is a video podcast series dedicated to bringing you the latest news and research from ESO, the European Southern Observatory. Here we explore the Universe's ultimate frontier.
…
continue reading
The Prospect Group is a leading global firm specializing in media, research, and consulting. We meet, and discuss the most relevant economic issues with, hundreds of the world’s leading business executives, political elites, and other influential personalities from a cross-section of industries and countries. Watch video interviews from around the world.
…
continue reading
The Prospect Group is a leading global firm specializing in media, research, and consulting. We meet, and discuss the most relevant economic issues with, hundreds of the world’s leading business executives, political elites, and other influential personalities from a cross-section of industries and countries. Watch video interviews from and/or about Malaysia.
…
continue reading
The Prospect Group is a leading global firm specializing in media, research, and consulting. We meet, and discuss the most relevant economic issues with, hundreds of the world’s leading business executives, political elites, and other influential personalities from a cross-section of industries and countries. Watch video interviews from and/or about Thailand.
…
continue reading
The Prospect Group is a leading global firm specializing in media, research, and consulting. We meet, and discuss the most relevant economic issues with, hundreds of the world’s leading business executives, political elites, and other influential personalities from a cross-section of industries and countries. Watch video interviews from and/or about the United Arab Emirates (UAE).
…
continue reading

1
Photoswitches: A New Addition to the Molecular Toolkit – HD
Ludwig-Maximilians-Universität München
…
continue reading
Ken Steele is Canada's most trusted higher ed monitor and futurist, and in this webcast he rounds up emerging trends, research data, best practices and innovative new ideas for higher education. (For HD version see YouTube, DailyMotion, Vimeo or Facebook. Audio only podcast version available separately.)
…
continue reading
Here, thunder::tech will share with you videos of integrated marketing splendor.
…
continue reading
The Hamilton Institute is a multi-disciplinary research centre established at the National University of Ireland, Maynooth in November 2001. The Institute seeks to provide a bridge between mathematics and its applications in ICT and biology. In this podcast feed, we make accessible some of the best seminars held by members of the Hamilton Institute, visitors or guest speakers. Futhermore, it will also contain the lectures give as part of the 'Network Mathematics Graduate Programme'.
…
continue reading
Prospect HD - Economies in Motion. The Prospect Group is a leading global firm specializing in media, research, and consulting. We meet, and discuss the most relevant economic issues with, hundreds of the world’s leading business executives, political elites, and other influential personalities from a cross-section of industries and countries. Watch profiles of various sectors from around the world.
…
continue reading
Metamask Wallet Clone Script is the pre-made software that has the same functionalities similar to the original Metamask Wallet. Multi-currency assist, Two-factor verification, HD settings, and many more features are there. So, create your Wallet once and earn more profits. After much research, I prefer WeAlwin Technologies is one of the leading Wallet Development Company which offers services. They have delivered 150+ projects to clients beyond their expectations. Get a free demo. Reach the ...
…
continue reading
Ken Steele is Canada's most trusted higher ed monitor and futurist, and in this podcast he rounds up emerging trends, research data, best practices and innovative new ideas for higher education. (This is an audio-only podcast. Video webcast version available separately. For HD video version see YouTube, DailyMotion, Vimeo or Facebook.)
…
continue reading
Metamask Wallet Clone Script is the pre-made software that has the same functionalities similar to the original Metamask Wallet. Multi-currency assist, Two-factor verification, HD settings, and many more features are there. So, create your Wallet once and earn more profits. After much research, I prefer WeAlwin Technologies is one of the leading Wallet Development Company which offers services. They have delivered 150+ projects to clients beyond their expectations. Get a free demo. Reach the ...
…
continue reading
Brought to you by the Huntington’s Outreach Project for Education at Stanford, the HOPES podcast shares stories that shed light on the history and current issues in Huntington’s Disease research.
…
continue reading
The CAS lecture series „Cutting Edge“ addresses the various challenges that scholarship is facing today. Current political and economic changes, such as globalization, great discoveries like genome sequencing or the hypotheses of string theory are asking for scientific creativity. What can different disciplines offer to answer those challenges? What is the current state of research, what is cutting edge? | Die Vortragsreihe am Center for Advanced Studies fragt nach den aktuellsten Entwicklun ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Formerly known as ‘Truther TV’, hosted by 9/11 Activist filmmaker of We Are Change LA-9-11 Truth DJ Thermal Detonator. As a continual and collaborative channel of self-produced, controversial investigatory documentaries and short films about unresolved issues, mysteries, and cover-ups regarding the Sept. 11th attacks, the 1993 WTC Bombing, and other related events. Presented for skeptics and as competing alternative conspiracy theories for 9/11 Truth, and independent accountability seekers. ...
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More. - SWN #487
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Donut Holes, clickfix, rapperbots, bad devs, war, Doug Rants about Backups, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-487
…
continue reading
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading
44% of men die prematurely in Canada. Most likely higher in the US. But what about men with Huntington's Disease?By WeHaveAVoice
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
$200,000 Zoom Call, Microsoft, Zero-Click, China & HD With $649 million of Bitcoin - SWN #485
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38This week we have, $200,000 Zoom Call, Microsoft Teams, INTERPOL, Zero-Click, Junk Food, China & Hard Drive With $649 million of Bitcoin. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-485
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
Security Money: The Index is Up, CISOs Need to Get Out, and Are You Burning Out? - BSW #399
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
…
continue reading

1
Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more... - SWN #484
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Vixen Panda, NPM, Roundcube, IoT, 4Chan, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-484
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
The enterprise security news, more secure by removing credentials, & RSAC interviews - Marty Momdjian, Amit Saha, Dr. Tina Srivastava - ESW #410
1:38:02
1:38:02
Play later
Play later
Lists
Like
Liked
1:38:02Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
…
continue reading

1
Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More... - SWN #483
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Elsa, Redline, ChaosRat, iMessage, Bladed Feline , Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-483
…
continue reading

1
Updating & Protecting Linux Systems - PSW #877
1:05:23
1:05:23
Play later
Play later
Lists
Like
Liked
1:05:23Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
…
continue reading

1
Regain Control of Business Risks, Your Leadership Habits, and Being Present - Alla Valente - BSW #398
1:18:17
1:18:17
Play later
Play later
Lists
Like
Liked
1:18:17During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
…
continue reading

1
Bovril, Deranged, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet... - SWN #482
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Bovril, Deranged Hookworm, Crocodilus, Cartier, Jinx, Conti, Scattered Spider, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-482
…
continue reading

1
AIs, MCPs, and the Acutal Work that LLMs Are Generating - ASW #333
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
…
continue reading

1
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409
1:38:33
1:38:33
Play later
Play later
Lists
Like
Liked
1:38:33Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading