How One Tweet Changed This Man’s Life…

How One Tweet Changed This Man’s Life…

Up next

My OpenClaw setup that finally works (Complete Walkthrough)

I sit down with Moritz Kremb, an OpenClaw power user and agency builder based in Berlin, to break down how to actually make OpenClaw useful. Moritz walks through a 10-step optimization guide covering everything from troubleshooting and memory management to model selection and sec ...  Show more

AI Agents Full Course 59 Minutes (for beginners)

I sit down with Remy Gaskell to break down how anyone can build AI agents to run entire departments of their business. Remy walks through the core concepts: agent loops, context files, memory, MCP tool connections, and skills. We put everything together by building a fully functi ...  Show more

Recommended Episodes

E60: The 2021 Bestie Awards PLUS Jack Dorsey starts the Web3 Wars
All-In with Chamath, Jason, Sacks & Friedberg

(0:00) Catching up on the Web3 wars and Jack Dorsey sounding off (5:10) Biggest Winner - Politics (9:43) Biggest Loser - Politics (14:37) Biggest Political Surprise (22:24) Biggest Winner - Business (26:03) Biggest Loser - Business (30:54) Biggest Business Surprise (35:27) Best S ...  Show more

E27: The Great Inflation Debate, Amazon gets spicy on Twitter, rethinking supply chains & more
All-In with Chamath, Jason, Sacks & Friedberg
Meet The Man Who Make Million From Twitter | Sahil Bloom
The Iced Coffee Hour

Start creating high-quality content easily with Streamyard: https://clickurl.ca/ICH-streamyard Use my code ICH to get $5 off your delicious, high protein Magic Spoon cereal by clicking this link: https://magicspoon.thld.co/ich_0423 Check out the Patreon! https://www.patreon.com/i ...  Show more

Episode 13: How to Find a Good BBP + Acropalypse + ZDI
Critical Thinking - Bug Bounty Podcast

Episode 13: In this episode of Critical Thinking - Bug Bounty Podcast we talk about how to determine if a bug bounty program is good or not from the policy page. We also cover some news including Acropalypse, ZDI's Pwn2Own Competition, Node's Request library's SSRF Bypass, and a ...  Show more