Monday, March 03, 2025

The Telepathy Tapes Podcast - Worth the Listen


"The Telepathy Tapes," hosted by documentary filmmaker Ky Dickens, is a groundbreaking and thought-provoking podcast that challenges conventional notions of communication, consciousness, and human potential. Launched in September 2024, this 10-episode series (with a second season already announced) has captivated audiences worldwide, briefly claiming the #1 spot on Spotify's podcast charts in early 2025. Alongside neuroscientist Dr. Diane Hennacy Powell, Dickens embarks on an awe-inspiring journey to explore the extraordinary abilities of nonverbal individuals with autism—abilities that suggest telepathy might not just be science fiction, but a hidden reality.


The podcast’s central premise is as bold as it is compelling: nonverbal autistic individuals, long underestimated by society, possess profound gifts that defy materialist science. Through emotional storytelling and meticulously documented experiments, "The Telepathy Tapes" presents evidence of these silent communicators accurately perceiving thoughts, words, and numbers from their loved ones—sometimes from another room, with astonishing accuracy rates like 95% or even 100%. Dickens introduces listeners to families and teachers who have witnessed these phenomena for years, quietly marveling at abilities that range from mind-to-mind communication to otherworldly perceptions, such as glimpses of alternate dimensions or connections to a collective consciousness dubbed "The Hill."

https://podcasts.apple.com/us/podcast/the-telepathy-tapes/id1766382649

Worth the listen

What sets this series apart is its blend of heart and inquiry. Dickens doesn’t merely report—she immerses herself in the lives of these families, forging intimate relationships that reveal the depth of their experiences. From a mother who discovers her son knows the contents of a TV show he couldn’t have seen, to children spelling out precise answers to unspoken questions via communication boards or iPads, the podcast builds a case that these are not anomalies but untapped human potentials. Dr. Powell’s involvement adds a layer of scientific curiosity, framing telepathy as a possible extension of the brain’s electromagnetic properties—a hypothesis that could rewrite our understanding of consciousness itself.


The narrative unfolds progressively, starting with relatable stories of misunderstood brilliance and escalating to paradigm-shifting implications: Are we all connected beyond words? Could nonverbal individuals be the key to unlocking a universal "signal" of consciousness? Later episodes delve into even more extraordinary claims—lucid dream communication, precognition, and a vision of reality where no one truly dies—suggesting that these individuals might be bridges to a deeper truth about existence.


"The Telepathy Tapes" is not just a podcast; it’s a call to rethink everything we’ve been taught about the mind. It dares listeners to step beyond skepticism and embrace a reality where the impossible happens every day. While critics may question its scientific rigor, the series shines as a beacon of hope and wonder, amplifying the voices of a silenced community and urging humanity to see itself anew. For anyone intrigued by the mysteries of the human spirit, this is an unmissable, transformative listen—one that promises to leave your perspective forever changed.


Friday, January 10, 2025

Hybrid Hosting Strategies - Where Prioritizing Tech, Compliance and Business Needs Matters

 Hybrid Hosting Strategies - Where Prioritizing Tech, Compliance and Business Needs Matters

January 2025 - Author:Robert Zullo Jr. 


Before we begin, let's dive into the concept of hybrid hosting models. What does 'hybrid' even mean in the context of hosting? It's essentially blending internal and external resources for managing software applications.


First, let's define what we're working with:


- Internal Hosting: You own the hardware, manage the software, keep everything in-house.

- External Hosting: Cloud services or third-party data centers handle your infrastructure.


Now, how do we mix these? Let's explore:


1. Basic Hybrid Model:


The simplest form might be where you host your core, sensitive data on-premises but use cloud services for less critical applications or for scaling during peak times. 


- But wait, how do we define 'sensitive'? Is it just about legal standards or also about business strategy?

- If you're storing customer data internally for privacy reasons, but your application logic runs in the cloud, how secure is the connection between these two environments? 

- What happens when there's a surge in traffic? Will the cloud part scale seamlessly, or will there be a bottleneck at the integration point?


2. Multi-Cloud Hybrid:


Here, you're not just mixing internal with one cloud but potentially several cloud services.


- This could be for redundancy or to leverage specific services from different providers.

- But, oh my, the complexity! Managing consistency across multiple platforms? How do you ensure data integrity?

- What about latency? If one service is in one geographic region and another in a different one, how does that affect performance?


3. Edge Computing Hybrid:


This involves pushing some of your data processing closer to where the data is generated or where it's needed most, reducing latency.


- You could keep the bulk of your computing in the cloud or on-premise but use edge nodes for real-time processing.

- But, hold on... How secure are these edge nodes? They're more distributed, hence potentially more vulnerable.

- What's the maintenance like? Can you manage updates and patches across all these nodes without issues?


4. Disaster Recovery Hybrid:


This isn't about daily operations but ensuring continuity.


- You might keep your primary data center internally but have a cloud setup ready for failover.

- But what if the disaster affects both simultaneously? How do you ensure true redundancy?

- There's also the cost aspect - maintaining a second, fully operational environment isn't cheap.


5. Application-Specific Hybrid:


Here, different applications or even different parts of the same application might be hosted differently based on their specific needs.


- Maybe your frontend is in the cloud for global reach, but the backend with all the business logic stays internal.

- How do you manage this split? What about API management, data flow security?


6. Data Sovereignty Hybrid:


For companies operating across borders, this might involve hosting data in regions where it's legally required.


- You could use a cloud for international operations but keep local data in-country.

- But, compliance... How do you ensure you're meeting all local laws while maintaining a cohesive IT strategy?


Revisiting and Doubting:


- Every model seems to offer benefits but at the cost of increased complexity. 

- Is the complexity justified by the benefits? Or are we just adding layers of potential failure?

- What about the human factor? Training, managing teams across these environments can be daunting.


Towards Resolution:


The natural resolution seems to be that hybrid hosting isn't about choosing one model but picking elements from various models to fit your specific context:


- Security might dictate keeping sensitive operations in-house.

- Scalability might push you towards cloud for non-sensitive, scalable components.

- Latency could be managed by edge computing where response time is critical.

- Compliance might require a geographically distributed model.


The final design of a hybrid hosting model would be a bespoke solution, constantly evolving as needs change, threats evolve, and technology advances. 


In Conclusion 

Hybrid hosting model designs vary from basic integrations of on-premise and cloud resources to complex systems involving multiple clouds, edge computing, and strategic disaster recovery. Each design must be tailored to the organization's specific needs, balancing security, compliance, performance, and cost. The key is not to adopt one model but to adapt and evolve a combination of models that fit the ongoing strategic and operational requirements.

Wednesday, October 30, 2024

Certianty

Certainty is the great enemy of unity. Certainty is the deadly enemy of tolerance. Even Christ was not certain at the end. 'Eli Eli, lama sabachtani?' He cried out in His agony at the ninth hour on the cross. 'My God, my God, why have you forsaken me?' Our faith is a living thing precisely because it walks hand in hand with doubt. If there was only certainty, and if there was no doubt, there would be no mystery, and therefore no need for faith.”

Thursday, December 22, 2016

The art of struggle

Truly fascinating read into the ethos of struggle

The human (overly male focused by this author) need to survive

The impact of modern post industrial evolution on the struggle

Hope and the new struggle..

If you appreciate Dylan Thomas and " do not go gentle into that goodnight" this read is for you


http://www.artofmanliness.com/2016/12/21/call-new-strenuous-age/

Wednesday, July 13, 2016

#GeoGaming - Welcome

Our new hastag #GeoGaming welcome to the world.  With the palette of Gaming, Mobility and a little inspiration from Geo-Cacheing-Fencing, Pokeman Go has just changed the mobile market for gaming.

 An industry waiting to be found has just been let out of it's cage.

Great Article

http://mashable.com/2016/07/10/john-hanke-pokemon-go/#W2tYi1BhHmqk


-Robert Zullo
ZuCom

Thursday, March 10, 2016

Deregister an old Mac from getting iMessages forwarded to it

Tricky situation SOLVED.

iPhone was setup to have iMessages and SMS forwarded to the Messages app on a MBP  
MBP goes away for some reason (longer in your possession)
On the iPhone under General>Messages>Text Message Forwarding the old MBP name shows up on the iPhone still.  (ok not so great)

NOW WHAT?  Who wants that key floating around out there waiting for someone to login and start getting your personal texts.  Yeah I know that's a little paranoid to think of the hoops that need to be jumped through to get there, nonetheless, it's a genuine security concern.  An encryption key is an encryption key after all.

SOLUTION: Head over to https://selfsolve.apple.com/deregister-imessage/us/en.  This will un-register the phone from ALL devices, be they in your possession or not.   Wait a few hours and re-register only on the machines you want it registered on.

Nifty trick with lots of good use cases