A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Hosted by Dan Tomaszewski, The Powered Services Pro podcast is your high-voltage source for all the cutting-edge trends and electrifying information you need to supercharge your MSP. Plug into vital industry strategies and insights while diving into the hottest topics shaping the channel—whether it's tapping into new markets, leveraging advanced tools, or adopting forward-thinking strategies. Tune in to power up your MSP!
…
continue reading
Trilio Insights delves into the dynamic world of data protection and cloud-native technologies. In addition to Trilio experts, we will bring together practitioners, innovators, and visionaries to explore the evolving landscape of data protection, backup, and recovery. From unraveling the complexities of multi-cloud environments to navigating the challenges of data governance, each episode of Trilio Insights serves to share expertise and experience for Product Engineering, It Ops, Dev Ops, Ar ...
…
continue reading
Venyu Solutions Podcast (Video)
…
continue reading
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
We provide email recovery, cloud backup, and data migration tools worldwide. User can also test the free demo version before purchasing the solution.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A show about stealing the internet.
…
continue reading
🎙️ Ready to enhance your reading experience? Let eShare.ai transform our insightful blogs into captivating audio podcasts! 📚🔊 Get ready to listen and learn on the go! 🚗🎧
…
continue reading
Welcome to Tech New Vision’s Podcast, We are a team of tech enthusiasts dedicated to bringing you the latest apps, reviews, and insights from the world of technology.
…
continue reading
Speaking in Tech: "Where Enterprise Tech meets Consumer Tech...". Speaking in Tech is hosted by Peter Smallbone, Josh Atwell and Melissa Gurney Greene. Topics include popular tech, data storage, cloud computing, networking, storage virtualization, server virtualization, backup, disaster recovery and anything else interesting in the tech world. Disclosure: Speaking in tech does not receive support directly or indirectly from vendors or guests. Vendor relationships are disclosed on the podcast.
…
continue reading
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
…
continue reading
The Tech Savvy Lawyer interviews Judges, Lawyers, and other professionals discussing utilizing technology in the practice of law. It may springboard an idea and help you in your own pursuit of the business we call "practicing law". Please join us for interesting conversations enjoyable at any tech skill level!
…
continue reading
Audio versions of new articles as they’re posted on http://askleo.com
…
continue reading
Welcome to the eFolder Channel Chat. These short, unscripted conversations are real stories from real channel partners moderated by Ted Hulsy, VP Marketing eFolder. eFolder is a leading supplier of cloud data protection, business continuity, cloud file sync solutions, and cloud to cloud backup for MSPs, cloud service providers, system integrators, and VARs. Delivered as wholesale services to the channel, eFolder enables its partners to provide branded data protection and file sync services a ...
…
continue reading
Alternative Pakistani music and culture magazine. mosiki.co
…
continue reading
Lenovo Customer Care +1(415)547-0376 Support Phone Number Facing any problem while dealing with your Lenovo device? Want to know various services provided by Lenovo? Or Want to access Lenovo Support Service? Click here!! Lenovo Support In today’s world of cut and throw competition, any firm which is ruling the market will keep ruling till their customers were satisfied. And having a satisfied customer is only possible with two things, i.e., Good Quality Product and best Customer Support Serv ...
…
continue reading
"Hello, We are introduce to our Diamond Scientific Comapny and their product Biogas GEM™5000 With H2S | Portable Methane Detector located in cocoa, florida, in USA. Best technology in the world to measure gas Competitive pricing Service and 35+ years of experience company. The Portable Biogas Analyzer 5000 With H2S is used for The Accurate Gas Monitoring. BIOGAS 5000 Methane Detectors have A Robust, High Quality Design which can be Fitted easily And are extremely Easy To Use In Laboratory, F ...
…
continue reading
Peel back the glamour of the professional recording world. Guests from the world of audio for music, film, games, restoration, and more share their insights on how they made their journey, how they survive, their advice on the real things including wins, losses, working with other people, money, and career advice. Hosted by audio engineer Matt Boudreau. The Working Class Audio Podcast - Navigating the World of Recording with a working class perspective.
…
continue reading
Tune in for lively, insightful discussion of topics important to the mainframe community, from DevOps to security and staffing. 2020 & 2024 winner of the DevOps Dozen Award for Best DevOps-Related Podcast Series.
…
continue reading
Welcome to the news and podcast section of Geelong's friendliest design studio. This is the page we host our podcast on. Make sure you never miss a show by subscribing! (links are all over the page to do so.) What are your thoughts? Like to comment? Or just want to chew the cudd? then drop us a line. Make sure you check out our news for some of the latests developments!
…
continue reading
A Technology Geek Podcast with an EVER so Slight Macintosh Bias!
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
We discuss different topics all across the IT landscape; spanning from Data and Information Security to Software Development and Complex Systems. We want to share our knowledge to help you understand IT better and assist in building up our community of tech wizards.
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
IT Support Services relied by world industry leaders. Our IT support specialist and technical support engineer can deliver IT solutions to businesses. Our Products - Managed services - Backup and disaster recovery, - Cloud computing - Sofware/system selection, - IT consulting - IT security - IT support - IT upgrades and migrations - Maintenance and monitoring - Network installation and upgrades - Server and desktop virtualisation - Server and network documentation - CargoWise EDI data entry ...
…
continue reading
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Welcome to "Powering SMB," the ultimate podcast dedicated to empowering small to medium-sized businesses (SMBs) with the knowledge, tools, and inspiration they need to thrive in today's competitive landscape. Hosted by XenTegra One, a leader in SMB-focused technology solutions, this podcast brings you insightful conversations with industry experts, thought leaders, and successful entrepreneurs who have mastered the art of powering SMBs to new heights. In each episode, we dive deep into the c ...
…
continue reading
Hashan Kodituwakku is a successful IT professional with over 15 years of progressive experience in IT services and security organizations, multiple degrees and professional development in computer services and information systems, deep knowledge of programming languages and operating systems, and an excellent record of work in infrastructure, software development and security systems
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
This video podcast offers sample trailers of recorded presentations from recent Gartner Events. At Gartner Events, information technology experts provide raw insight, strategy, advice and research in a conference environment. Visit "gartner.com/events" to find an event that's right for you and your role. Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right de ...
…
continue reading
Our Define Tomorrow podcast focuses on the latest technical insights covering the modern workspace, hybrid cloud and security.
…
continue reading

1
Backup Defense 101: Stopping Ransomware from Encrypting Your Data
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51Backups are your last line of defense against ransomware attacks—but what if ransomware can delete them too? Many organizations assume that having backups means they’re safe, but modern ransomware actively targets and destroys backups before demanding a ransom. In this episode, we break down how ransomware finds, encrypts, and deletes backup data, …
…
continue reading

1
BaaS vs. Traditional Backup: The Best Data Protection Strategy
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42Confused about backup solutions? Learn the key differences between Backup as a Service (BaaS) and traditional backup methods to find the best fit for your business or personal data.
…
continue reading

1
289: The Enterprise Backup Industry’s Worst Nightmare? – S2|DATA
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09W. Curtis Preston, aka “Mr. Backup,” reveals shocking insights from the world of data recovery. From a million-tape archive stored in a football-field-sized facility to the critical need for reading backup data without vendor lock-in, this conversation uncovers the hidden struggles of IT professionals. We dive into ransomware recovery, AI’s role in…
…
continue reading

1
293: The Fear Every CISO Has But Rarely Admits – Loreta Today
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver of trust in the boardroom. Loreta shares insights on overcoming imposter syndrome, building relationsh…
…
continue reading

1
293: The Fear Every CISO Has But Rarely Admits - Loreta Today
25:19
25:19
Play later
Play later
Lists
Like
Liked
25:19Loreta Tarozaite, CEO & Founder at Loreta Today breaks down the human side of cybersecurity leadership. We explore the fear of failure among CISOs, the power of executive presence, and how communication—not just technical skills—is the real driver of trust in the boardroom. Loreta shares insights on overcoming imposter syndrome, building relationsh…
…
continue reading

1
Building AI/ML Data Lakes: Why S3 Object Storage Outperforms Traditional Storage
19:45
19:45
Play later
Play later
Lists
Like
Liked
19:45AI and machine learning (ML) demand massive amounts of data, seamless scalability, and high-speed access—which is why traditional storage solutions often fall short. S3 object storage is rapidly becoming the go-to solution for AI/ML data lakes, enabling organizations to handle vast datasets efficiently and cost-effectively. In this episode, we expl…
…
continue reading
Incremental backups can be larger than expected, and that's okay.
…
continue reading

1
ESXiArgs Ransomware: A Silent Threat to VMware Servers
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11The ESXiArgs ransomware attack is a wake-up call for organizations relying on VMware ESXi servers for virtualization. Targeting unpatched and vulnerable systems, this ransomware encrypts virtual machines, leaving businesses locked out of their critical workloads. In this episode, we uncover: 🔹 How ESXiArgs ransomware infiltrates VMware environments…
…
continue reading

1
Cloud vs Tape Throwdown: Which is Better for Archiving?
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14In this episode of The Backup Wrap-Up, we look at the cloud vs tape debate for active archives. The conversation was sparked by a LinkedIn post claiming tape libraries are the only robots not making things easier in 2025, suggesting cloud is superior to tape for active archives. We challenge this premise by pointing out that cloud vs tape is a fals…
…
continue reading

1
Setting up your SIEM for success - Pitfalls to preclude and tips to take - Geoff Cairns, Neil Desai - ESW #400
1:58:15
1:58:15
Play later
Play later
Lists
Like
Liked
1:58:15A successful SIEM deployment depends on a lot more than implementing the SIEM correctly. So many other things in your environment have an impact on your chances of a successful SIEM. Are the right logs enabled? Is your EDR working correctly? Would you notice a sudden increase or decrease in events from critical sources? What can practitioners do to…
…
continue reading

1
WCA #537 with Peter Craft – Napa Destination Studio, Bonding Experiences, Life in Tech, Songwriters as Magicians, and Inspiration of Scenes
55:20
55:20
Play later
Play later
Lists
Like
Liked
55:20In this episode of Working Class Audio, Matt Boudreau chats with Peter Craft of Boxer Lodge Studio in Napa. From a tech career to full-time audio engineering, Peter shares his inspiring path back to music. Hear about his early recording dreams, building a destination studio, recording philosophy, and working with the vibrant Bay Area Americana scen…
…
continue reading

1
NC #1038 Yarbo Yard Robot, PLAUD AI Wearables, DJI Osmo Pocket 3 Camera, TEWKE Intelligent Lighting, Security Bits
1:38:25
1:38:25
Play later
Play later
Lists
Like
Liked
1:38:25Open Source Audacity — My Latest Video Tutorial for ScreenCastsONLINE CES 2025: Yarbo Modular Yard Robot CES 2025: PLAUD AI Voice Recorder Replacing a Big-Boy Camcorder with a DJI Osmo Pocket 3 & Mic2 CES 2025: TEWKE Intelligent Light Switch Support the Show Security Bits — 30 March 2025 (Bart Solo) Transcript of NC_2025_03_30 Join the Conversation…
…
continue reading
I’ve used the free and open source Audacity for audio recording and editing for as long as I can remember. I did my first podcast recordings using Audacity nearly 20 years ago. What I never did before though, was to actually learn how to use it well. I’d push record, do some minor edits, maybe […] The post Open Source Audacity — My Latest Video Tut…
…
continue reading
I find myself reacting more to those who are less then pleasant when they leave their feedback.
…
continue reading

1
Medical Data at Risk? How to Store & Protect Patient Records
16:52
16:52
Play later
Play later
Lists
Like
Liked
16:52As hospitals and healthcare providers transition from paper to digital, medical record storage and archiving have become critical challenges. From electronic health records (EHRs) to PACS imaging systems, healthcare organizations must manage massive volumes of sensitive patient data while ensuring compliance with HIPAA and other regulations. In thi…
…
continue reading

1
AI Workloads Demand More—Is Your Storage Ready?
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40AI workloads are pushing traditional IT infrastructure to its limits. In this episode, we break down how AI storage and servers must evolve to handle massive datasets, high-speed processing, and scalable performance. We’ll explore key challenges like latency, bandwidth, and the role of NVMe SSDs, high-capacity storage tiers, and GPU acceleration. J…
…
continue reading
In which we use the world's bestselling book to make gigantic numbers a little more tangible.
…
continue reading

1
Ransomware vs. Manufacturing: How Ransomware Disrupts Production Lines
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50Manufacturing is under attack. Ransomware is rapidly becoming one of the biggest threats to industrial operations, bringing production lines to a halt, disrupting supply chains, and costing businesses millions in lost revenue. In this episode, we dive into the alarming rise of ransomware in the manufacturing sector, exploring how cybercriminals tar…
…
continue reading

1
Volume Deletion Protection: The Ultimate Fail-Safe for Ransomware, Human Error, and Accidental Deletion
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19Data loss isn’t always caused by hardware failures—it can happen through accidental deletions, insider threats, and ransomware attacks that target storage volumes. In this episode, we break down Volume Deletion Protection, a critical safeguard that keeps your data intact even when disaster strikes. 🔹 What is Volume Deletion Protection and how does …
…
continue reading

1
Mrtentacle, Morphing Meerkat, Tor, VMWare, Waymo, Oracle, Aaran Leyland, and more... - SWN #463
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26Mrtentacle, Morphing Meerkat, Tor, VMWare, Waymo, Oracle, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-463
…
continue reading

1
Ransomware vs. Healthcare: The Silent Crisis in Hospitals
15:41
15:41
Play later
Play later
Lists
Like
Liked
15:41Hospitals and healthcare providers are on the frontlines of a growing cyber crisis—ransomware attacks that lock down critical systems, disrupt patient care, and put lives at risk. In this episode, we dive into how ransomware is crippling the healthcare industry and what can be done to stop it. 🔹 Why healthcare is one of the biggest targets for cybe…
…
continue reading

1
Education Under Attack: How Schools Can Secure Their Backups
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45Schools, colleges, and universities are storing more data than ever—from student records and research data to online learning platforms. But with the rise of ransomware, accidental deletions, and system failures, how can educational institutions ensure their data stays safe, accessible, and recoverable? In this episode, we break down the backup and…
…
continue reading

1
Protecting Your Data: Why I Avoid Most Pre-Installed Security and Encryption Software
4:24
4:24
Play later
Play later
Lists
Like
Liked
4:24External hard drives often come with security and backup software. I'm not convinced it should be used.
…
continue reading

1
How Immutable Snapshots Stop Ransomware Attacks in Their Tracks
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54Ransomware is evolving, and attackers aren’t just encrypting your files—they’re deleting your backups to leave you with no way out. So, how do you fight back? Immutable snapshots. In this episode, we dive into how immutable snapshots work, why they’re the best defense against ransomware, and how you can set them up on your NAS storage. Unlike tradi…
…
continue reading

1
SignalGate and How Not To Protect Secrets - PSW #867
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11How do we handle scope creep for vulnerabilities?, find the bugs before it hits the real world, risk or hype vulnerabilities, RTL-SDR in a browser, using AI to hack AI and protect AI, 73 vulnerabilities of which 0 patches have been issued, Spinning Cats, bypassing WDAC with Teams and JavaScript, Rust will solve all the security problems, did you he…
…
continue reading

1
Lynx Ransomware: The Stealthy Cyber Threat You Need to Know
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44Ransomware threats are constantly evolving, and Lynx ransomware is one of the latest and most dangerous strains making headlines. But what makes this malware so effective? And how can businesses defend against it? In this episode, we take a deep dive into how Lynx ransomware infiltrates systems, encrypts critical data, and demands hefty ransoms fro…
…
continue reading
The change to the Windows 11 right-click menu is annoying to many people. We can fix that (for now).
…
continue reading

1
Beyond Passwords: Why Multi-Factor Authentication is a Must
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43In today’s digital world, passwords alone aren’t enough to keep cybercriminals out. Multi-Factor Authentication (MFA) has become a critical security measure, adding an extra layer of protection against unauthorized access, data breaches, and identity theft. But how does it really work? And why are some businesses still not using it? In this episode…
…
continue reading

1
Ransomware as a Service (RaaS): How Hackers Sell Cybercrime
15:52
15:52
Play later
Play later
Lists
Like
Liked
15:52Ransomware is no longer just a tool for elite hackers—it’s now a service for sale on the dark web. Ransomware-as-a-Service (RaaS) has transformed cybercrime, allowing even low-skilled attackers to launch devastating ransomware campaigns against businesses, governments, and individuals. In this episode, we break down how RaaS works—from its subscrip…
…
continue reading

1
Ransomware vs. Finance: How Cybercriminals Target Banks and Institutions
22:16
22:16
Play later
Play later
Lists
Like
Liked
22:16Banks, credit unions, and financial institutions are prime targets for ransomware attacks, with cybercriminals seeking to steal sensitive financial data or hold entire networks hostage for massive payouts. The financial sector faces a relentless wave of cyber extortion, with devastating consequences—including service disruptions, regulatory fines, …
…
continue reading

1
When Cars Stop Rolling: The Cost of Ransomware Attacks on Automakers
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16Ransomware attacks are wreaking havoc on the automotive industry, bringing production lines to a grinding halt and costing manufacturers millions in downtime and recovery. But why is this industry such a prime target? In this episode, we break down how ransomware infiltrates automotive supply chains, assembly lines, and dealerships, exposing critic…
…
continue reading

1
LockBit 3.0 & Beyond: The Ransomware Threat That Keeps Evolving
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08In this episode, we dive deep into LockBit ransomware, a modern cyber threat that’s making headlines worldwide. We’ll explore how LockBit operates—from its initial intrusion methods to the sophisticated encryption techniques it uses to hold organizations hostage. Discover the tactics behind its rapid data encryption, and learn about the double exto…
…
continue reading

1
Why Email Forwarding is Broken and What to Do Instead
10:24
10:24
Play later
Play later
Lists
Like
Liked
10:24Learn to pull your email together rather than push it.
…
continue reading

1
Inside Conti Ransomware’s Arsenal: Tactics, Techniques, and Threats
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59In this episode, we dive deep into Conti ransomware, one of today’s most notorious cyber threats. We explore how Conti infiltrates networks, the sophisticated methods it uses to encrypt data, and its infamous double extortion tactics. By breaking down Conti’s technical architecture—from its initial breach and infection strategies to the robust encr…
…
continue reading

1
The Pace of Investments Requires Better Risk Management, Boards Challenged, & More - BSW #388
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22Cybersecurity teams were under increasing strain in 2024. To alleviate this burden, 2025 will see greater reliance on automation to streamline workflows, enhance threat detection, and accelerate incident response. But some of these investments may come with risks. Greg Sullivan, Founding Partner at CIOSO Global, joins Business Security Weekly to di…
…
continue reading

1
AI in 2025: Game-Changing Tools & The Power of StoneFly Appliances
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41AI is evolving faster than ever—are you keeping up? In this episode, we break down the most impactful AI tools of 2025, from text-to-speech advancements to game-changing productivity hacks. Whether you're a creator, entrepreneur, or tech enthusiast, discover how AI can streamline your work, spark creativity, and revolutionize entire industries. Plu…
…
continue reading

1
Writing Better PowerShell with Jeff Hicks
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37How do you write better PowerShell? Richard talks to Jeff Hicks about his latest book, Behind the PowerShell Pipeline, and his efforts to promote writing PowerShell scripts that are easy to understand, use, and maintain! Jeff talks about how making a script work is not enough anymore - you can use GitHub Copilot. The goal is to make the output as u…
…
continue reading

1
Remote Access Trojans Exposed: How Hackers Take Control
13:37
13:37
Play later
Play later
Lists
Like
Liked
13:37In this episode, we dive into the world of Remote Access Trojans (RATs) — malicious software that gives cybercriminals stealthy control over your systems. We break down how RATs work, from their initial infection to the way they provide attackers with complete remote access. Drawing from real-world examples and expert analysis, we discuss the tacti…
…
continue reading

1
Deploying StoneFly SA365: Enhancing Cybersecurity with SIEM
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59In this episode, we dive into the deployment of the StoneFly SA365 Cybersecurity SIEM Appliance, exploring how it strengthens security by providing real-time threat detection, log management, and compliance solutions. Learn how organizations can enhance their cybersecurity posture, streamline incident response, and protect critical data with this p…
…
continue reading

1
Curdled Miscreant, VanHelsing, MFA, Room 237, MFA, Velora, 23nMe, Josh Marpet... - SWN #462
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11Curdled Miscreant, VanHelsing, MFA, Room 237, MFA, Velora, 23nMe, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-462
…
continue reading