Logo

    139

    Explore " 139" with insightful episodes like "EP 139: Lynn Hill — Breaking Barriers in Climbing, How to Find Self-Belief, and Challenging Social Norms", "#179 Infinite Echoes Soundsystem 139", "A brief history of Time Zones and Daylight Saving Time (emf2022)", "A brief history of Time Zones and Daylight Saving Time (emf2022)" and "A brief history of Time Zones and Daylight Saving Time (emf2022)" from podcasts like ""The Nugget Climbing Podcast", "Radiolla", "Chaos Computer Club - recent events feed (high quality)", "Chaos Computer Club - recent audio-only feed" and "Chaos Computer Club - recent events feed (low quality)"" and more!

    Episodes (33)

    EP 139: Lynn Hill — Breaking Barriers in Climbing, How to Find Self-Belief, and Challenging Social Norms

    EP 139: Lynn Hill — Breaking Barriers in Climbing, How to Find Self-Belief, and Challenging Social Norms

    Lynn Hill is a living legend. She is best known for being the first person to free El Capitan via The Nose in 1993. We talked about what it is like to be Lynn Hill in the modern climbing world, her upbringing, what sets her apart, the story of freeing The Nose, tips for shorter climbers, her mindset and affirmations, self-belief, how she makes a living these days, upcoming video projects, and much more.

    Check out Grasshopper Climbing!

    grasshopperclimbing.com

    instagram.com/grasshopperclimbing

    Tell them I sent you to save $500 off a fully kitted out 8'x10' Grasshopper board! 

    Check out Athletic Greens!

    athleticgreens.com/NUGGET

    Use this link to get a free year's supply of vitamin D + 5 travel packs!

    Check out Rhino Skin Solutions!

    rhinoskinsolutions.com

    Use code “NUGGET” at checkout for 20% off your next order!

    Check out Frictitious Climbing!

    frictitiousclimbing.com

    Use code "NUGGET" at checkout for free shipping on your next order!

    Check out Arc'teryx!

    arcteryx.com

    Arc'teryx Presents: Free as Can Be

    Check out Chalk Cartel!

    chalkcartel.com

    Use code "NUGGET" at checkout for 20% off your next order!

     

    We are supported by these amazing BIG GIVERS:

    • Leo Franchi, Michael Roy, David Lahaie, Robert Freehill, Jeremiah Johnson, Scott Donahue, Eli Conlee, Skyler Maxwell, Craig Lee, and Mark and Julie Calhoun

    Become a Patron:

    patreon.com/thenuggetclimbing

    Show Notes:  

    thenuggetclimbing.com/episodes/lynn-hill

    Nuggets:

    (00:00:00) – Intro

    (00:06:27) – Lynn’s technique video

    (00:12:58) – How Lynn thinks about climbing technique

    (00:16:47) – The documentary Lynn is working on, and Lynn’s thoughts on Free Solo

    (00:18:53) – Having the vision to free climb The Nose

    (00:21:01) – What it feels like to be Lynn Hill, and why she likes her gates facing out

    (00:28:07) – Being famous before the internet

    (00:29:48) – Harrison Ford, and how to act toward famous people

    (00:33:33) – Being the first woman to climb 12d (7c), traveling to Europe in 1986, and learning French

    (00:38:01) – Finishing college, getting “kidnapped by climbing”, and her first sponsorship

    (00:42:33) – Being connected to the people who are pushing the sport forward, and Lynn's project with Sasha DiGiulian

    (00:50:24) – Who excites Lynn the most in climbing right now

    (00:56:22) – Why Lynn decided to try to free The Nose

    (01:00:33) – The reality of aging, and appreciating the journey

    (01:06:11) – Why The Nose was such a special experience

    (01:08:53) – Lynn’s visualization process, climbing her first 5.14 in France, and yawning before redpoint attempts

    (01:11:14) – Breathing and screaming

    (01:14:12) – Lynn’s process of freeing The Nose

    (01:23:41) – Projecting the Changing Corners pitch

    (01:28:11) – Going for it, and Brooke Sandahl’s role in The Nose going free

    (01:32:07) – Why Lynn decided to free The Nose in a day, and how she trained for it

    (01:35:56) – Her mindset for efficiency on The Nose, and sending during the full moon

    (01:40:01) – “It’s actually pretty strenuous…” and the Lynn Hill traverse

    (01:41:59) – Lynn’s height and ape index (5’1 1/4”, 0 ape index)

    (01:43:29) – Advice for shorter climbers

    (01:45:53) – First Ascent (Naked Edge film by Bob Carmichael), and the training Lynn was doing in the early 80s

    (01:53:14) – Lynn’s family upbringing, her temperament, and what sets her apart

    (01:55:58) – The “what if” game, and taking an unconventional path

    (01:59:07) – Lynn’s current sponsorships, and how she makes a living these days

    (02:03:09) – There are a lot of ways to make it as a pro climber

    (02:07:56) – Patron Question from Nick: What parts of climbing culture would you like to see maintained? What would you be happy to see disappear?

    (02:13:33) – Patron Question from Bradley: What do Lynn’s passions look like today?

    (02:15:23) – Patron Question from Jessica: Onsighting the FA of Mingus in 1994 in the Verdon

    (02:21:59) – Patron Question from Matt: What was it like climbing on The Nose with Nina Caprez? Are you mentoring any other women?

    (02:29:07) – Building ab strength after having a baby, and Lynn’s replica of the Changing Corners intro move

    (02:32:20) – Other women Lynn has mentored

    (02:33:51) – Patron Question from Craig: Who have you climbed with that had amazing footwork?

    (02:36:12) – Patron Question from Christoph: Can Lynn speak about the mental side of pushing boundaries?

    (02:41:32) – Patron Question from Emily: How did Lynn learn to be independent from the limiting gendered cues coming from society at the time in order to realize her true potential?

    (02:44:33) – Lynn’s positive affirmations, challenging societal norms as a teenager, and seeing injustice in the world

    (02:51:12) – Patron Question from Mark: Have women reached parody in climbing? If not, what can be done?

    (02:58:45) – What Lynn is most excited about right now, her Italian name, and the value of learning other languages

    (03:02:26) – Feeling excited about her new route on The Maiden, and ideas for her next trip to France

    (03:05:32) – More about the documentary Lynn is working on

    (03:09:04) – Where to buy “It goes boys” shirts, and signed photos from Lynn!

    (03:11:01) – Lynn’s plans for Hueco

    Wikidata for (Data) Journalists (rc3)

    Wikidata for (Data) Journalists (rc3)
    Data journalists work similarly to scientists: they formulate (research) hypotheses, analyze data and sometimes even collect data themselves. For this, open data ressources are crucial. They can can reveal unfamiliar correlations, lead to new questions and stories. Wikidata is the largest linked open data ressource on the internet. But what exactly is stored in it and how can journalists use it for their work? We will have a look at the way Wikidata works and how it can be used a.k.a. queried for stories and research. about this event: https://cfp.verschwoerhaus.de/rc3-2020/talk/TQH39G/

    Wikidata for (Data) Journalists (rc3)

    Wikidata for (Data) Journalists (rc3)
    Data journalists work similarly to scientists: they formulate (research) hypotheses, analyze data and sometimes even collect data themselves. For this, open data ressources are crucial. They can can reveal unfamiliar correlations, lead to new questions and stories. Wikidata is the largest linked open data ressource on the internet. But what exactly is stored in it and how can journalists use it for their work? We will have a look at the way Wikidata works and how it can be used a.k.a. queried for stories and research. about this event: https://cfp.verschwoerhaus.de/rc3-2020/talk/TQH39G/

    Die Geschichte von Open-Source-Software (vcfb20)

    Die Geschichte von Open-Source-Software (vcfb20)
    Was genau ist eigentlich Open Source? Was unterscheidet Open Source von Closed Source, was war zuerst, und welche Bedeutung kommt Open Source für die Entwicklung von Computern bis heute zu? Was motivierte Entwickler, sich schon sehr früh in Open-Source-Projekten zu beteiligen? Wie wurden Open-Source-Projekte organisiert, und warum waren sie erfolgreich? Welche besonderen Herausforderungen waren mit Open Source verknüpft? Was lernen wir aus Open-Source-Projekten der Vergangenheit für die Zukunft der Softwareentwicklung oder vielleicht sogar generell für neue Organisationsformen der Zusammenarbeit? All diesen Fragen wird im Vortrag anhand historischer Beispiele wie dem GNU-Projekt nachgegangen. about this event: https://c3voc.de

    Die Geschichte von Open-Source-Software (vcfb20)

    Die Geschichte von Open-Source-Software (vcfb20)
    Was genau ist eigentlich Open Source? Was unterscheidet Open Source von Closed Source, was war zuerst, und welche Bedeutung kommt Open Source für die Entwicklung von Computern bis heute zu? Was motivierte Entwickler, sich schon sehr früh in Open-Source-Projekten zu beteiligen? Wie wurden Open-Source-Projekte organisiert, und warum waren sie erfolgreich? Welche besonderen Herausforderungen waren mit Open Source verknüpft? Was lernen wir aus Open-Source-Projekten der Vergangenheit für die Zukunft der Softwareentwicklung oder vielleicht sogar generell für neue Organisationsformen der Zusammenarbeit? All diesen Fragen wird im Vortrag anhand historischer Beispiele wie dem GNU-Projekt nachgegangen. about this event: https://c3voc.de

    #132 Cyborg Vs Trator, AJ vs Queixinho F2W 139/140 Double Header Recap, Preview F2W 141

    #132 Cyborg Vs Trator, AJ vs Queixinho F2W 139/140 Double Header Recap, Preview F2W 141

    This week on the Grappling Rewind Maine and Emil Break down the Main and Co-Main event for Fight to Win 139 and 140 that took place this weekend in Dallas Texas.  Headlined by Roberto Cyborg Abreu vs Vinicius Trator Ferreira, and Osvaldo "Queixinho" Moizinho vs AJ Agazarm, with matchups between Johnny Tama and Ethan Crelinsten, and Gabriel Almeida vs Roberto Jimenez in the Co-Main slots this weekend.  

    In the news section of the show we talk about the brackets for Third Coast Grappling being released for the first 3CG Kumite.  We talk about BJJ and MMA retirements and un-retirements, the new things on the Grappling Rewind website including articles, an updated event list, and more.  We also talk about BJJ EBI OT Only event that Eddie Bravo has announced grapplers for and dates. 

    In the recap section of the show we break down Cyborg vs Trator and how Cyborgs great top game and conjunction with his body lock passing and pressure lead to his victory at F2W 139.  In the Co-Main we break down the stellar match between Johnny Tama and Ethan Crelinsten that showed so many layers to the leg lock game as well as the rare third layer of knowledgeable counter submission after defense.  We talk about some of the most interesting entries we saw and how impressed we were with both grapplers leg locks and pacing throughout the match.  

    In our recap of Fight to Win 140 we talked about how tough vs AJ Agazarm is, ,and how many deep subs Queixinho threw up in an attempt to submit him.  We break down his entry into numerous omaplatas and armbars, and talk about the defense that allowed AJ to weather the storm.  In the Co-Main we talk about Gabriel Almeida vs Roberto Jimenez, which saw a great deal of complex 50/50 and 50/50 back attack attempts.  We talk about how we are seeing more transitions from 50/50 into other positions and how the position is used less and less in recent years as a stalling position.  We also go through the rest of the results on both cards and talk about the Submissions of the night.  

    In the preview section of the show we take a look at Fight to Win 141 headlined by Rafael Lovato Jr. vs Arnaldo Maidana for the now vacant Light Heavyweight title.  We talk about Lovato looking to reclaim this title after losing it to Yuri Simoes before Yuri was forced to vacate due to injury.  In the Co-Main event slot on the event we take a look at Edwin Najmi vs Benson Henderson, we talk about the possibility of a Edwin Najmi flying triangle given Bensons low stance, but we also factor in Bensons wrestling if the match stays on the feet for a length of time. 

    In the outro of the show Maine and Emil talk about Yoga and running, and how they both have been using quarantine to improve physical conditioning.  

    Recorded 5-18-2020

    System Transparency (36c3)

    System Transparency (36c3)
    The ever increasing usage of cloud-based software forces us to face old questions about the trustworthiness of our software. While FLOSS allows us to trust software running on our platforms, System Transparency establishes the same level of trust in SaaS and IaaS scenarios. In a System Transparency context, all parties that depend on the services of a particular server can retrieve the complete source code of firmware and OS running on it. They can reproduce all binaries and verify remotely that these were run as part of the boot process. This gives every user the ability to verify claims of the service provider like the absence of logs or lack of backdoor access. System Transparency accomplishes this by - giving every server a unique, cryptographic identity that is kept in a hardware trust anchor, - using a provisioning ritual to associate this identity with a particular hardware, - running the FLOSS firmwares coreboot and LinuxBoot instead of proprietary UEFI implementations, - building firmware and OS images are reproducible, - retrieving all OS images from the network, keeping only minimal state on the disk, - signing all OS images as well as listing them in a public append-only log and - minimizing administrator access to prevent invisible changes to the OS after it has been booted. This talk introduces System Transparency and details the platform security features we implemented as part of our reference system. We also describe our reference implementations’ custom bootloader based on LinuxBoot. It verifies that boot artifacts are signed by the server owner and are in the transparency log before continuing. This makes sure that 3rd parties can audit past and present artifacts booted on the platform. Finally, we demo a modern x86 server platform running our prototype coreboot/LinuxBoot stack. about this event: https://fahrplan.chaos-west.de/36c3/talk/D9BFMN/

    System Transparency (36c3)

    System Transparency (36c3)
    The ever increasing usage of cloud-based software forces us to face old questions about the trustworthiness of our software. While FLOSS allows us to trust software running on our platforms, System Transparency establishes the same level of trust in SaaS and IaaS scenarios. In a System Transparency context, all parties that depend on the services of a particular server can retrieve the complete source code of firmware and OS running on it. They can reproduce all binaries and verify remotely that these were run as part of the boot process. This gives every user the ability to verify claims of the service provider like the absence of logs or lack of backdoor access. System Transparency accomplishes this by - giving every server a unique, cryptographic identity that is kept in a hardware trust anchor, - using a provisioning ritual to associate this identity with a particular hardware, - running the FLOSS firmwares coreboot and LinuxBoot instead of proprietary UEFI implementations, - building firmware and OS images are reproducible, - retrieving all OS images from the network, keeping only minimal state on the disk, - signing all OS images as well as listing them in a public append-only log and - minimizing administrator access to prevent invisible changes to the OS after it has been booted. This talk introduces System Transparency and details the platform security features we implemented as part of our reference system. We also describe our reference implementations’ custom bootloader based on LinuxBoot. It verifies that boot artifacts are signed by the server owner and are in the transparency log before continuing. This makes sure that 3rd parties can audit past and present artifacts booted on the platform. Finally, we demo a modern x86 server platform running our prototype coreboot/LinuxBoot stack. about this event: https://fahrplan.chaos-west.de/36c3/talk/D9BFMN/

    System Transparency (36c3)

    System Transparency (36c3)
    The ever increasing usage of cloud-based software forces us to face old questions about the trustworthiness of our software. While FLOSS allows us to trust software running on our platforms, System Transparency establishes the same level of trust in SaaS and IaaS scenarios. In a System Transparency context, all parties that depend on the services of a particular server can retrieve the complete source code of firmware and OS running on it. They can reproduce all binaries and verify remotely that these were run as part of the boot process. This gives every user the ability to verify claims of the service provider like the absence of logs or lack of backdoor access. System Transparency accomplishes this by - giving every server a unique, cryptographic identity that is kept in a hardware trust anchor, - using a provisioning ritual to associate this identity with a particular hardware, - running the FLOSS firmwares coreboot and LinuxBoot instead of proprietary UEFI implementations, - building firmware and OS images are reproducible, - retrieving all OS images from the network, keeping only minimal state on the disk, - signing all OS images as well as listing them in a public append-only log and - minimizing administrator access to prevent invisible changes to the OS after it has been booted. This talk introduces System Transparency and details the platform security features we implemented as part of our reference system. We also describe our reference implementations’ custom bootloader based on LinuxBoot. It verifies that boot artifacts are signed by the server owner and are in the transparency log before continuing. This makes sure that 3rd parties can audit past and present artifacts booted on the platform. Finally, we demo a modern x86 server platform running our prototype coreboot/LinuxBoot stack. about this event: https://fahrplan.chaos-west.de/36c3/talk/D9BFMN/

    PDL#139 - Desenvolvimento de Jogos

    PDL#139 - Desenvolvimento de Jogos
    Neste Papo de Louco convidamos uma galera de peso, que estão lançando na steam o Spook Station, um pacote de 9 jogos de todos os tipos com uma temática de Halloween.
    Edição - Luciano Munhoz. Capa - Luciano Munhoz.

    Mande seu e-mail de histórias, sugestões e Feedback para: contato@papodelouco.com.
    PIX: contato@papodelouco.com
    Padrim: padrim.com.br/papodelouco.
    Picpay: app.picpay.com/user/papodelouco.
    Facebook: facebook.com/papodeloucooficial.
    Twitter: twitter.com/papodelouco_.
    Instagram: instagram.com/papodelouco_podcast.

    Store: papodelouco.com/store.

    Die fabelhafte Welt der (Information) Security (mrmcd18)

    Die fabelhafte Welt der (Information) Security (mrmcd18)
    "Informationssicherheit in Unternehmen" wurde unlängst mit der Goldenen Himbeere für die schlechteste Komödie der letzten 30 Jahre prämiert. Dabei ist die Filmidee vielversprechend und mit einem guten Drehbuch und der richtigen Besetzung könnte es ein Kassenschlager werden. Ungeliebt, missverstanden oder gänzlich missachtet, so führt die Informationssicherheit in den meisten Unternehmen ein eher tristes Dasein. Der Weg aus dieser Misere nennt sich Information Security Management System (ISMS), zu Deutsch "Informationssicherheitsmanagementsystem". Doch Vorsicht: Klein und fein sollte es sein und kein Pottwal, der ständig aus dem viel zu kleinen Goldfischglas springt. Dies ist keine Liebesgeschichte, doch mit dem richtigen Plot steht einem Happy End letztlich nichts mehr im Wege. about this event: https://talks.mrmcd.net/2018/talk/DWYEUR

    Die fabelhafte Welt der (Information) Security (mrmcd18)

    Die fabelhafte Welt der (Information) Security (mrmcd18)
    "Informationssicherheit in Unternehmen" wurde unlängst mit der Goldenen Himbeere für die schlechteste Komödie der letzten 30 Jahre prämiert. Dabei ist die Filmidee vielversprechend und mit einem guten Drehbuch und der richtigen Besetzung könnte es ein Kassenschlager werden. Ungeliebt, missverstanden oder gänzlich missachtet, so führt die Informationssicherheit in den meisten Unternehmen ein eher tristes Dasein. Der Weg aus dieser Misere nennt sich Information Security Management System (ISMS), zu Deutsch "Informationssicherheitsmanagementsystem". Doch Vorsicht: Klein und fein sollte es sein und kein Pottwal, der ständig aus dem viel zu kleinen Goldfischglas springt. Dies ist keine Liebesgeschichte, doch mit dem richtigen Plot steht einem Happy End letztlich nichts mehr im Wege. about this event: https://talks.mrmcd.net/2018/talk/DWYEUR

    Digitale Kompetenz fördern - unterstützende Tools (pw17)

    Digitale Kompetenz fördern - unterstützende Tools (pw17)
    „Digitale Kompetenz“ ist mehr als Bedienen der neuesten Version proprietärer Software eines Großkonzerns. Manche Ansätze greifen tiefer und bieten deutlich mehr. Tablet-Klassen, Notebook-Klassen, verschafft das "Digitale Kompetenz"? Wenn wir Verständnis mit Spass vermitteln wollen, gibt es andere Wege: Community, freie Software, freie Hardware, Anreizt für eigene Erweiterungen und Experimente. Herbert Waloschek, war Abteilungsleiter in einer Großbank im Bereich Organisation und Informationstechnologie about this event: https://c3voc.de
    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io