OwlTail

Cover image of Abe Singer

Abe Singer

5 Podcast Episodes

Latest 1 May 2021 | Updated Daily

Weekly hand curated podcast episodes for learning

Episode artwork

Abe Singer on Business Ethics as a Practical and Political Endeavor

Q Talks: Podcast

What is commerce and why do we have it? What is business and why does it exist? What power dynamics do we find in business? In today's episode Professor of Ethics, Abraham Singer explores his perspective on ethical behaviors of business with Professor Al Gini. Want to learn more? Singer's latest book is The Form of the Firm expounds on these ideas. 

24mins

21 May 2020

Episode artwork

Multi-Factor Authentication at NERSC, Abe Singer Interview

NERSC User News

In this interview with NERSC security specialist Abe Singer, learn about NERSC's plans for Multi-Factor Authentication (MFA), discover what will happen when MFA becomes mandatory in the new allocation year, and hear answers to some frequently asked user questions about MFA.

20mins

26 Nov 2018

Similar People

Episode artwork

Latest MFA Developments at NERSC, Abe Singer Interview

NERSC User News

This week NERSC Security Analyst Abe Singer returns to the show to discuss the latest developments with Multi-Factor Authentication (MFA) at NERSC. Tune in to hear about sshproxy (a NERSC-developed utility for generating ssh keys with MFA that can be used all day) and hear Abe's answers to common user questions. Be sure to listen until the end for a question even Abe can't answer!

17mins

17 Sep 2018

Episode artwork

MFA & Abe Singer Interview

NERSC User News

Find out all about multi-factor authentication (MFA) at NERSC, as well as the name of the podcast theme song, in this interview with NERSC security analyst Abe Singer.

17mins

14 May 2018

Most Popular

Episode artwork

Abe Singer, "Towards Mining Syslog Data"

CERIAS Security Seminar Podcast

Syslog is the primary source of information about intrusion-relatedactivity on a Unix system. Searching for known messages andpatterns in syslog data is easy to do, and many tools are availablefor doing so. However, information and patterns that are notalready "known" -- those that have not been seen or derivedalready, may provide even more information about attacks andintrusions. Data mining techniques can help us discover and analyzethat information, but, the general lack of structure in syslog datamakes it impossible to apply these techniques directly to the data.To address the problem, we are researching methods of generatingpatterns from an archive of system logs which can uniquely identifysyslog messages by the variant and invariant elements of themessages. Once syslog messages can be uniquely identified, datamining techniques for use in intrusion detection or forensicanalysis will be far more useful.

3 Nov 2004