Are you on top of the latest innovations in data, analytics, and AI? With data being pivotal to strategy and change, the Data-powered Innovation Jam podcast gives you the key to some of the most crucial aspects of business success. Through our guests, we bring you the latest trends from the world of data and AI, discussing the best ideas and experiences. Our hosts with their decades of profound experience and a background in avant-garde music, will also explore the edges of jazz, rock, and p ...
…
continue reading
Data Pipeline Architecture Podcasts
This show goes behind the scenes for the tools, techniques, and difficulties associated with the discipline of data engineering. Databases, workflows, automation, and data manipulation are just some of the topics that you will find here.
…
continue reading
Learn the latest data science updates in the tech world.
…
continue reading
Hi, we’re Tim Berglund, Adi Polak, and Viktor Gamov and we’re excited to bring you the Confluent Developer podcast (formerly “Streaming Audio.”) Our hand-crafted weekly episodes feature in-depth interviews with our community of software developers (actual human beings - not AI) talking about some of the most interesting challenges they’ve faced in their careers. We aim to explore the conditions that gave rise to each person’s technical hurdles, as well as how their experiences transformed th ...
…
continue reading
Independent contractor software developer and cloud platform engineer. Podcast and music by Pilgrim Engineering Architecture Technology PEAT UK
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Hosted by Viktor Gamov and Kaitlyn Barnard, we interview software developers and technology leaders at the top of their game every other week. We’ll also give you the tools, tactics and strategies you need to take your cloud native architecture to the next level. We go beyond the buzzwords and dissect real-life applications and success stories so that you can tackle your biggest connectivity challenges.
…
continue reading

1
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
…
continue reading

1
How Businesses Are Turning Space Data into a Tool for Risk, Resilience, and Sustainability
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06This story was originally published on HackerNoon at: https://hackernoon.com/how-businesses-are-turning-space-data-into-a-tool-for-risk-resilience-and-sustainability. Satellites are reshaping insurance, supply chains, and sustainability—here’s how space data became core to global business strategy. Check more stories related to data-science at: htt…
…
continue reading

1
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
…
continue reading

1
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
…
continue reading

1
The Fix That Secured 1000s of Credit Cards ft. Brian Sletten | Ep. 4
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37In this episode, Tim talks to Brian Sletten (Bosatsu Consulting) about his career in software development. His first job: working at a small communications company that built network matrix switch interfaces. His challenge/theme: overhauling credit card storage and security at a major hospitality company. SEASON 2 Hosted by Tim Berglund, Adi Polak …
…
continue reading

1
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
…
continue reading

1
Malware Analysis Using Artificial Intelligence and Deep Learning
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
…
continue reading

1
Context Engineering as a Discipline: Building Governed AI Analytics
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58Summary In this episode of the Data Engineering Podcast, host Tobias Macey welcomes back Nick Schrock, CTO and founder of Dagster Labs, to discuss Compass - a Slack-native, agentic analytics system designed to keep data teams connected with business stakeholders. Nick shares his journey from initial skepticism to embracing agentic AI as model and a…
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading

1
How Data Innovation Changed a State’s Infrastructure Engine
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44This story was originally published on HackerNoon at: https://hackernoon.com/how-data-innovation-changed-a-states-infrastructure-engine. Deepak Chanda modernized Massachusetts’ infrastructure systems through data-driven process innovation—turning inefficiency into lasting operational reform. Check more stories related to data-science at: https://ha…
…
continue reading

1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading

1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading
By CyberSecurity Summary
…
continue reading
By Capgemini
…
continue reading
By CyberSecurity Summary
…
continue reading

1
How Viktor Gamov Stays Curious as Tech Rapidly Evolves | Ep. 3
30:11
30:11
Play later
Play later
Lists
Like
Liked
30:11Adi Polak interviews her co-host, Viktor Gamov, about his career’s evolution from distributed systems to streaming technology. Viktor’s first job: apple picking. His challenge/theme: staying curious and non-judgmental in the ever-changing landscape of tech. SEASON 2 Hosted by Tim Berglund, Adi Polak and Viktor Gamov Produced and Edited by Noelle Ga…
…
continue reading

1
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
…
continue reading

1
The Data Model That Captures Your Business: Metric Trees Explained
1:01:05
1:01:05
Play later
Play later
Lists
Like
Liked
1:01:05Summary In this episode of the Data Engineering Podcast Vijay Subramanian, founder and CEO of Trace, talks about metric trees - a new approach to data modeling that directly captures a company's business model. Vijay shares insights from his decade-long experience building data practices at Rent the Runway and explains how the modern data stack has…
…
continue reading

1
ITIL 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
…
continue reading

1
ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types.…
…
continue reading

1
Introduction to Python Network Automation: The First Journey
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48Provides a detailed guide for network engineers to transition into network automation. It commences with fundamental Python concepts, covering data types, syntax, and error handling through numerous exercises. The book then progresses to Linux administration essentials, emphasizing the creation and management of virtual environments using VMware Wo…
…
continue reading

1
Intelligent Reliability Analysis Using MATLAB and AI: Perform Failure Analysis and Reliability Engineering using MATLAB and Artificial Intel
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04Introduces intelligent reliability analysis using MATLAB and AI, focusing on failure analysis and reliability engineering. It covers foundational concepts like reliability fundamentals, measures of reliability such as MTBF and MTTF, and remaining useful lifetime (RUL) estimation techniques. The sources also explore experimental methodologies like a…
…
continue reading

1
Implementing VMware Dynamic Environment Manager:: Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies
19:41
19:41
Play later
Play later
Lists
Like
Liked
19:41A comprehensive guide to VMware Dynamic Environment Manager (DEM), a solution for managing end-user desktop experiences. It details the installation and initial configuration of DEM, including setting up Group Policy Objects (GPOs) and understanding the NoAD mode. The text explores various aspects of desktop management, such as user personalization…
…
continue reading

1
NoOps: How AI Agents Are Reinventing DevOps and Software
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Explores the evolution of DevOps and its contemporary challenges, particularly the issue of fragmented toolchains and the necessity of standardization. It details how cloud-native and data-centric architectures, including microservices, containers, and Infrastructure as Code (IaC), establish a robust foundation for modern software delivery. A signi…
…
continue reading

1
OpenAI API Cookbook: Build intelligent applications including chatbots, virtual assistants, and content generators
18:31
18:31
Play later
Play later
Lists
Like
Liked
18:31A practical guide for building intelligent applications using the OpenAI API. The book provides step-by-step instructions on leveraging various OpenAI endpoints, including Chat Completions, Images, and Audio, to create diverse applications like chatbots, virtual assistants, and content generators. It explains how to interact with the API through to…
…
continue reading

1
How Tim Berglund Found His Calling | Ep. 2
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36Viktor Gamov interviews his co-host, Tim Berglund, about his career in the world of streaming data. Tim’s first job: Burger King broiler steamer. His challenge/theme: pivoting from working in hardware and firmware to finding his calling in enterprise software and developer relations. SEASON 2 Hosted by Tim Berglund, Adi Polak and Viktor Gamov Produ…
…
continue reading

1
Mastering spaCy: Build structured NLP solutions with custom components and models powered by spacy-llm
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46A comprehensive guide for Natural Language Processing (NLP) professionals, focusing on advanced techniques and applications using the spaCy library. The text covers various topics, including linguistic feature extraction, rule-based matching, utilizing transformer models like BERT and RoBERTa within spaCy, and integrating Large Language Models (LLM…
…
continue reading

1
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12A comprehensive guide for network professionals transitioning from traditional Multiprotocol Label Switching (MPLS) to Segment Routing MPLS (SR-MPLS). It aims to simplify this complex shift through theoretical explanations and practical lab exercises, using network emulators like EVE-NG and virtual Cisco XRv9k routers. The text explores fundamental…
…
continue reading

1
From GPUs-as-a-Service to Workloads-as-a-Service: Flex AI’s Path to High-Utilization AI Infra
56:31
56:31
Play later
Play later
Lists
Like
Liked
56:31Summary In this crossover episode of the AI Engineering Podcast, host Tobias Macey interviews Brijesh Tripathi, CEO of Flex AI, about revolutionizing AI engineering by removing DevOps burdens through "workload as a service". Brijesh shares his expertise from leading AI/HPC architecture at Intel and deploying supercomputers like Aurora, highlighting…
…
continue reading

1
Ruby Way, The: Solutions and Techniques in Ruby Programming (Addison-Wesley Professional Ruby Series)
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
…
continue reading

1
Mastering C++ Game Animation Programming: Enhance your skills with advanced game animation techniques in C++, OpenGL
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
…
continue reading

1
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
21:18
21:18
Play later
Play later
Lists
Like
Liked
21:18A powerful technology for programming the Linux kernel to enhance observability, networking, and security. It explains eBPF's fundamentals, including its virtual machine, instruction set, maps, and helper functions, along with the verifier that ensures program safety. The text details how eBPF programs are written in C (and increasingly Rust), comp…
…
continue reading

1
Machine Learning for Tabular Data: XGBoost, Deep Learning, and AI
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09Focuses on machine learning for tabular data, covering its fundamental concepts and practical applications. The sources explore various machine learning and deep learning approaches, with a particular emphasis on gradient boosting techniques like XGBoost and LightGBM, highlighting their efficacy with structured data. Readers will learn about data p…
…
continue reading

1
Learn Quantum Computing with Python and IBM Quantum: Write your own practical quantum programs with Python
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42A comprehensive guide for individuals seeking to understand and implement quantum programs using Python and the IBM Quantum platform. It explores fundamental quantum computing principles like superposition, entanglement, and interference, detailing how these concepts underpin the creation of quantum circuits. The text also provides practical instru…
…
continue reading

1
Learning LangChain: Building AI and LLM Applications with LangChain and LangGraph
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25A comprehensive guide for developers creating AI and Large Language Model (LLM) applications. The book covers fundamental concepts such as prompt engineering and retrieval-augmented generation (RAG), explaining how to integrate external data and manage conversational memory. It thoroughly explores various cognitive architectures like chains, router…
…
continue reading

1
How to Optimize Your Marketing Budget Using Just Three Letters: MMM
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26This story was originally published on HackerNoon at: https://hackernoon.com/how-to-optimize-your-marketing-budget-using-just-three-letters-mmm. Marketing Mix Modeling is a statistical analysis method used in marketing to determine the optimal allocation of resources. Check more stories related to data-science at: https://hackernoon.com/c/data-scie…
…
continue reading

1
Here's How ShareChat Scaled Their ML Feature Store 1000X Without Scaling the Database
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42This story was originally published on HackerNoon at: https://hackernoon.com/heres-how-sharechat-scaled-their-ml-feature-store-1000x-without-scaling-the-database. How ShareChat scaled its ML feature store to 1B features/sec on ScyllaDB, achieving 1000X performance without scaling the database. Check more stories related to data-science at: https://…
…
continue reading
A comprehensive guide for mastering shader programming within the Unity 5 game engine. Authored by Alan Zucconi and Kenneth Lammers, it explores various lighting models, rendering techniques, and visual effects, ranging from basic diffuse shading and texture mapping to advanced concepts like Physically Based Rendering (PBR) and screen effects. The …
…
continue reading

1
Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies)
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36Explores the integration of Cloud Computing and the Internet of Things (IoT), highlighting their combined applications across diverse sectors. It details the fundamental concepts of both cloud computing and IoT, including their architectures, components, advantages, and disadvantages. The source also examines real-world applications such as smart c…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/why-you-shouldnt-judge-by-pnl-alone. PnL can lie. This hands-on guide shows traders how hypothesis testing separate luck from edge, with a Python example and tips on how not to fool yourself. Check more stories related to data-science at: https://hackernoon.com/c/data-scie…
…
continue reading

1
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30Discuss Radio Frequency Identification (RFID) technology, exploring its evolution and applications across various industries, particularly supply chain management and retail. They examine the technical advancements in RFID, including printed electronics and silicon ink, highlighting their impact on cost reduction and performance. A significant port…
…
continue reading

1
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05A practical resource for mastering cybersecurity assessments. The text covers Nmap's versatile applications in network security, including penetration testing, red teaming, and purple teaming, detailing fundamental and advanced scanning techniques. It emphasizes setting up a lab environment for hands-on practice, mapping attack surfaces, identifyin…
…
continue reading

1
From "Decentralized" to "Unified": SUPCON Uses SeaTunnel to Build an Efficient Data Collection Frame
16:17
16:17
Play later
Play later
Lists
Like
Liked
16:17This story was originally published on HackerNoon at: https://hackernoon.com/from-decentralized-to-unified-supcon-uses-seatunnel-to-build-an-efficient-data-collection-frame. SUPCON dumped siloed data tools for Apache SeaTunnel—now core sync tasks run 0-failure! Check more stories related to data-science at: https://hackernoon.com/c/data-science. Yo…
…
continue reading

1
The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44Offers an in-depth look at security concerns surrounding Large Language Models (LLMs), drawing heavily from "The Developer’s Playbook for Large Language Model Security" by Steve Wilson. It presents endorsements highlighting the book's importance for AI developers and security professionals due to the novel risks LLMs introduce. The text outlines va…
…
continue reading

1
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY (Bitcoins, Hacking, Kali Linux)
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12Provides an extensive overview of operational security (opsec) and anonymity in the digital and physical realms. It thoroughly explains the use of tools like Tor, Freenet, and various encryption methods (PGP, Truecrypt, Veracrypt) to protect digital footprints, communications, and data. The text also highlights the importance of physical security p…
…
continue reading

1
Building Real-time Systems for Apple, Nike & more ft. Adi Polak | Ep. 1
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53The Confluent Developer Podcast is here! For this first episode, Tim Berglund talks to his co-host, Adi Polak (Confluent), about her career in distributed data systems. Her first job: neighborhood dogwalker. Her challenge/theme: early Hadoop, working at Akamai on data optimization and real-time threat detection for huge global customers like Apple,…
…
continue reading