The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
IoT Security Podcasts
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Tune in to Cassia's podcast as we talk about all things Bluetooth. Learn about Bluetooth Technology and how today's enterprises are leveraging this technology to scale their IoT applications.
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
…
continue reading
Each episode, Angela and Vince dig into the key issues facing organizations when it comes to cybersecurity and CPS (Cyber-Physical Systems). Sponsored by Viakoo, the leader in CPS vulnerability remediation.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
The term "Jom Pakai IoT" in the Malay Language mean "Let's Do IoT" (English). The Podcast is meant to share the issues, challenges, and tips on how to start your Internet of Things Journey.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
We live in an era where businesses are digitally disrupted almost on a daily basis. The Industrial Internet of Things (IoT) is a unique framework to enable businesses exploit the power of digital innovations and emerge as disruptors (and winners). The IOT Review is a podcast specifically designed to empower business decision makers and IT practitioners with highly relevant technology and strategic insights that's needed to integrate IoT in their business models... to gain in-depth know-how o ...
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Discover the latest technology trends, meet technology enthusiasts, understand what’s behind talked about technological terms and get inspired by our passion for technology.
…
continue reading
The BLC Connection Podcast is a fun and informative show from Ben Lomand Connect that answers your questions about the internet, Wi-Fi, home security and more, and brings you information on the stories and events in “Ben Lomand Country.” Bryan, Karen and Micah take you behind the scenes of Ben Lomand Connect, where the cooperative connects Middle Tennessee with the latest in communications technology and with businesses that are making a difference in our service territory. The BLC Connectio ...
…
continue reading
The Conversations of Things podcast series is hosted by Joe Dugandzic and features interesting guests from inside and outside the technology world, discussing everything from the smart home to general tech to all of the connected gadgets in our lives. Where is all of this technology taking us? Is it helpful or harmful in the long run? And, of course, discussions on recent tech news and the latest must-have devices.
…
continue reading
Podcast by Cycling Industry News
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
IoT on Tap is a weekly podcast focusing on the Internet of Things from a developers perspective. Chris Herrera and Randy Pitcher from Hashmap, Inc will be talking about how someone can reasonably go from the "hello world" of IoT to actually doing advanced analytics and machine learning on their device data. Music: https://www.bensound.com
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
…
continue reading
Speaking of Service uncovers practical ways to grow service revenue, control costs, and improve customer satisfaction. If you’re looking to innovate, gain a competitive edge, or just learn about the latest service trends, you’ve come to the right place! Also check: www.ptc.com/speakingofservice
…
continue reading
Electronic Design has been serving the engineering community with pride for decades, providing news, commentary, and interviews about the industry. Hosted by industry veteran Alix Paultre, the Inside Electronics podcast brings you commentary, news, and interviews about the things going on in the electronic design engineering community and its surrounding business ecosystem.
…
continue reading
Community run ServerlessPodcast.com
…
continue reading
Tech Transformation with Evan Kirstel: A podcast exploring the latest trends and innovations in the tech industry, and how businesses can leverage them for growth, diving into the world of B2B, discussing strategies, trends, and sharing insights from industry leaders! With over three decades in telecom and IT, I've mastered the art of transforming social media into a dynamic platform for audience engagement, community building, and establishing thought leadership. My approach isn't about per ...
…
continue reading
Talking the beat to cover what matters to you as an LEO. Join deputy chief Jim Dudley (ret.) every weekly as he sits down with law enforcement leaders and criminal justice experts to discuss strategy, challenges and trends in policing.
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Podcast by Quectel
…
continue reading
Real people, real stories - Ericsson Conversations. Internal podcasts about our people, products, and solutions.
…
continue reading
Welcome to "Analyze Happy: Crafting Your Modern Data Estate", the podcast where data meets delight! Dive into the world of modern data estate tools and discover how to harness advanced analytics, data governance, and AI transformation to accelerate growth in your organization. With a spotlight on the Microsoft ecosystem—think Fabric, Azure Databricks, Power Platform, IoT Edge, and Real-Time Intelligence—we’ll explore best practices, actionable insights, and the latest innovations to build a ...
…
continue reading
Elevate the Edge helps companies understand what edge computing is and how the market will evolve. The podcast will help technology leaders build successful strategies that deliver business value by learning what works from the masters and how to avoid pitfalls. ElevateTheEdge.com
…
continue reading
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
…
continue reading
Broadcasting Ideas and Connecting Minds at the Intersection of Cybersecurity, Technology and Society. Founded by Sean Martin and Marco Ciappelli in 2015, ITSPmagazine is a multimedia platform exploring how technology, cybersecurity, and society shape our world. For over a decade, we've recognized this convergence as one of the most defining forces of our time—and it's more critical than ever. Our global community encourages intellectual exchange, challenging assumptions and diving deep into ...
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading

1
IoT Hacks Galore - Kieran Human - PSW #895
2:09:14
2:09:14
Play later
Play later
Lists
Like
Liked
2:09:14This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
…
continue reading
🎧 IoT Unplugged Season 7, Episode 5 is live ! ⏰ In the last Episode of the series, Caitlin Gittins, Editor at IoT Insider, sits down with Toby Wilmington, CEO, Periphery, to discuss securing critical infrastructure.By IoT insider
…
continue reading

1
How a Small Team Rewrote Mobile for Billions
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39Interested in being a guest? Email us at [email protected] Your phone’s most magical moments—messages turning blue, a watch pairing in seconds, an eSIM activating from Settings, a text sent from the middle of nowhere—don’t happen by accident. They ride on a quiet protocol called entitlements, and today we sit down with Emir Aboulhosn, CEO of Ne…
…
continue reading

1
Implementing AWS S3 Server-Side Encryption with KMS: Secure Storage Made Simple
18:15
18:15
Play later
Play later
Lists
Like
Liked
18:15Implementing AWS S3 Server-Side Encryption with KMS: Secure Storage Made Simple https://knowledge.businesscompassllc.com/implementing-aws-s3-server-side-encryption-with-kms-secure-storage-made-simple/ Data breaches and compliance requirements keep cloud administrators and developers up at night. AWS S3 server-side encryption KMS offers a straightfo…
…
continue reading

1
Streamline IAM Management with AWS CloudFormation Templates
15:10
15:10
Play later
Play later
Lists
Like
Liked
15:10Streamline IAM Management with AWS CloudFormation Templates https://knowledge.businesscompassllc.com/streamline-iam-management-with-aws-cloudformation-templates/ Managing AWS IAM permissions manually creates security risks and slows down your development teams. AWS CloudFormation IAM templates solve this problem by automating identity access manage…
…
continue reading

1
Modern Cloud Transformation: SaaSifying a Legacy Platform Step-by-Step
16:56
16:56
Play later
Play later
Lists
Like
Liked
16:56Modern Cloud Transformation: SaaSifying a Legacy Platform Step-by-Step https://knowledge.businesscompassllc.com/modern-cloud-transformation-saasifying-a-legacy-platform-step-by-step/ Legacy platforms are holding back countless businesses from reaching their full potential. If you’re an IT leader, CTO, or enterprise architect struggling with outdate…
…
continue reading

1
Bridging the Data Gap in Modern Teams with Cloud-Native and AI-Powered Tools
13:02
13:02
Play later
Play later
Lists
Like
Liked
13:02Bridging the Data Gap in Modern Teams with Cloud-Native and AI-Powered Tools https://knowledge.businesscompassllc.com/bridging-the-data-gap-in-modern-teams-with-cloud-native-and-ai-powered-tools/ Modern organizations struggle with scattered data across multiple systems, creating barriers that slow down decision-making and frustrate teams. This data…
…
continue reading

1
Project Deep Dive: Encrypting and Securing DynamoDB with AWS KMS
16:46
16:46
Play later
Play later
Lists
Like
Liked
16:46Project Deep Dive: Encrypting and Securing DynamoDB with AWS KMS https://knowledge.businesscompassllc.com/project-deep-dive-encrypting-and-securing-dynamodb-with-aws-kms/ Your DynamoDB tables hold sensitive data that needs bulletproof protection. This podcast shows you how to implement DynamoDB encryption using AWS KMS to lock down your database an…
…
continue reading

1
Enhance Your Machine Learning Workflow with DeepSeek in SageMaker Studio
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30Enhance Your Machine Learning Workflow with DeepSeek in SageMaker Studio https://knowledge.businesscompassllc.com/enhance-your-machine-learning-workflow-with-deepseek-in-sagemaker-studio/ Machine learning teams and data scientists working in AWS environments can supercharge their productivity by integrating DeepSeek with SageMaker Studio. This powe…
…
continue reading

1
Accelerate Data AppDev: Windmill on K3s with Aurora Serverless Integration
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43Accelerate Data AppDev: Windmill on K3s with Aurora Serverless Integration https://knowledge.businesscompassllc.com/accelerate-data-appdev-windmill-on-k3s-with-aurora-serverless-integration/ Building fast, scalable data applications just got easier. This podcast shows developers and DevOps teams how to accelerate app development by combining Windmi…
…
continue reading

1
Secure RDS Connections Made Easy with AWS Verified Access
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22Secure RDS Connections Made Easy with AWS Verified Access https://knowledge.businesscompassllc.com/secure-rds-connections-made-easy-with-aws-verified-access/ Connecting to your AWS RDS databases securely doesn’t have to be complicated. AWS Verified Access transforms how you handle database access control by replacing traditional VPNs with a zero-tr…
…
continue reading

1
AWS API Gateway WebSocket API: Architecture, Setup, and Best Practices
21:45
21:45
Play later
Play later
Lists
Like
Liked
21:45AWS API Gateway WebSocket API: Architecture, Setup, and Best Practices https://knowledge.businesscompassllc.com/aws-api-gateway-websocket-api-architecture-setup-and-best-practices/ AWS API Gateway WebSocket API transforms how developers build real-time applications by providing a managed, serverless solution for persistent connections. This podcast…
…
continue reading

1
AWS Serverless Essentials: Simplifying Cloud Development with Lambda and Beyond
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12AWS Serverless Essentials: Simplifying Cloud Development with Lambda and Beyond https://knowledge.businesscompassllc.com/ws-serverless-essentials-simplifying-cloud-development-with-lambda-and-beyond/ Serverless computing has changed how developers build and deploy applications in the cloud. AWS serverless architecture removes the headache of managi…
…
continue reading

1
IoT Hacks Galore - Kieran Human - PSW #895
2:09:14
2:09:14
Play later
Play later
Lists
Like
Liked
2:09:14This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
…
continue reading

1
IoT Hacks Galore - Kieran Human - PSW #895
2:09:14
2:09:14
Play later
Play later
Lists
Like
Liked
2:09:14This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
…
continue reading

1
IoT Hacks Galore - Kieran Human - PSW #895
2:09:14
2:09:14
Play later
Play later
Lists
Like
Liked
2:09:14This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
…
continue reading

1
What's it like to go through the FedRAMP process?
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07This week on Safe Mode, we talk with Scott Montgomery, VP of Federal at Island, about the realities of achieving FedRAMP authorization. Scott demystifies the often daunting FedRAMP process, shares lessons learned from real-world experience, and reveals the biggest pitfalls organizations face. From data sensitivity requirements to the growing import…
…
continue reading

1
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
…
continue reading

1
How AI-Driven Resilience Fixes Firewall Misconfigurations and Closes Security Gaps
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31Interested in being a guest? Email us at [email protected] A single unchecked setting can hand your network to an attacker—and it happens more often than most teams admit. We sit down with Adam BennettCo-Founder and CEO from SureStack to unpack how “resilient intelligence” marries standards, deep practitioner experience, and AI to find misconfi…
…
continue reading

1
Inside the FBI National Academy: How 10 weeks at Quantico shapes police leaders
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Born from a push to professionalize policing, the FBI National Academy has evolved into a 10-week residential program where law enforcement leaders sharpen their fitness, academics and communication while building a global network. On this episode of Policing Matters, host Jim Dudley and two recent FBI NA graduates explore what the experience looks…
…
continue reading

1
Automating ReactJS App Deployment with AWS CodePipeline and CodeBuild
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03Automating ReactJS App Deployment with AWS CodePipeline and CodeBuild https://knowledge.businesscompassllc.com/automating-reactjs-app-deployment-with-aws-codepipeline-and-codebuild/ Deploying ReactJS applications manually gets old fast, especially when you’re pushing updates regularly. Automating React deployment with AWS CodePipeline and CodeBuild…
…
continue reading

1
How to Launch and Install NGINX on Ubuntu EC2 in AWS Cloud
14:00
14:00
Play later
Play later
Lists
Like
Liked
14:00How to Launch and Install NGINX on Ubuntu EC2 in AWS Cloud https://knowledge.businesscompassllc.com/how-to-launch-and-install-nginx-on-ubuntu-ec2-in-aws-cloud/ NGINX is one of the most popular web servers for hosting websites and applications, and setting it up on an Ubuntu EC2 instance gives you a powerful, scalable solution in the AWS cloud. This…
…
continue reading

1
Build, Test, and Deploy on AWS: CI Pipeline Explained with Example
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47Build, Test, and Deploy on AWS: CI Pipeline Explained with Example https://knowledge.businesscompassllc.com/build-test-and-deploy-on-aws-ci-pipeline-explained-with-example/ Creating a reliable AWS CI/CD pipeline tutorial can transform how your development team ships code. Manual deployments and testing bottlenecks slow down even the most talented t…
…
continue reading

1
Migrating to Graviton on Kubernetes for High Performance and Savings
15:18
15:18
Play later
Play later
Lists
Like
Liked
15:18Migrating to Graviton on Kubernetes for High Performance and Savings https://knowledge.businesscompassllc.com/migrating-to-graviton-on-kubernetes-for-high-performance-and-savings/ AWS Graviton processors are changing the game for Kubernetes teams who want better performance and lower costs. These ARM-based chips deliver up to 40% better price-perfo…
…
continue reading

1
Streamlined Sentiment Analysis Architecture with AWS SQS and Lambda
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59Streamlined Sentiment Analysis Architecture with AWS SQS and Lambda https://knowledge.businesscompassllc.com/streamlined-sentiment-analysis-architecture-with-aws-sqs-and-lambda/ Building a real-time sentiment analysis system that can handle thousands of messages per second doesn’t have to break your budget or overwhelm your infrastructure. AWS SQS …
…
continue reading

1
Strimzi Kafka Operator: Simplifying Kafka Management on Kubernetes
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15Strimzi Kafka Operator: Simplifying Kafka Management on Kubernetes https://knowledge.businesscompassllc.com/strimzi-kafka-operator-simplifying-kafka-management-on-kubernetes/ Running Apache Kafka on Kubernetes can feel like juggling flaming torches while riding a unicycle. The Strimzi Kafka operator changes that by turning complex Kafka cluster man…
…
continue reading

1
Performing Create, Read, Update, and Delete in DynamoDB with Node.js
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43Performing Create, Read, Update, and Delete in DynamoDB with Node.js https://knowledge.businesscompassllc.com/performing-create-read-update-and-delete-in-dynamodb-with-node-js/ DynamoDB CRUD operations with Node.js give you the power to build fast, scalable applications that handle massive amounts of data without breaking a sweat. This podcast is p…
…
continue reading

1
AWS Step Functions for Developers: Types, Benefits, and Practical Scenarios
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23AWS Step Functions for Developers: Types, Benefits, and Practical Scenarios https://knowledge.businesscompassllc.com/aws-step-functions-for-developers-types-benefits-and-practical-scenarios/ AWS Step Functions transforms how developers build and manage serverless workflows by turning complex distributed applications into visual, manageable processe…
…
continue reading

1
Architecting a Multilingual FAQ System: Best Practices with Node.js, Docker, and Scalable Design
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33Architecting a Multilingual FAQ System: Best Practices with Node.js, Docker, and Scalable Design https://knowledge.businesscompassllc.com/architecting-a-multilingual-faq-system-best-practices-with-node-js-docker-and-scalable-design/ Building a multilingual FAQ system that serves global audiences requires smart architecture choices and the right tec…
…
continue reading

1
Deploying Production-Ready Web Applications on AWS with Terraform
18:17
18:17
Play later
Play later
Lists
Like
Liked
18:17Deploying Production-Ready Web Applications on AWS with Terraform https://knowledge.businesscompassllc.com/deploying-production-ready-web-applications-on-aws-with-terraform/ Building and deploying web applications to AWS can feel overwhelming, especially when you need them to handle real-world traffic and stay secure. This podcast is designed for d…
…
continue reading

1
AI Creativity Expert Reveals Why Machines Need More Freedom - Creative Machines: AI, Art & Us Book Interview | A Conversation with Author Maya Ackerman | Redefining Society And Technology Podcast With ...
43:24
43:24
Play later
Play later
Lists
Like
Liked
43:24⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com ______Title: AI Creativity Expert Reveals Why Machines Need More Freedom - Creative Machines: AI, Art & Us Book Interview | A Conversation with Author Maya Ackerman | Redefining Society And Technology Podcast With Marco Ciappelli ______Guest: Maya Ackerma…
…
continue reading

1
When the Coders Don’t Code: What Happens When AI Coding Tools Go Dark? | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In this issue of the Future of Cyber newsletter, Sean Martin digs into a topic that’s quietly reshaping how software gets built—and how it breaks: the rise of AI-powered coding tools like ChatGPT, Claude, and GitHub Copilot. These tools promise speed, efficiency, and reduced boilerplate—but what are the hidden trade-offs? What happens when the tool…
…
continue reading

1
How AI Maps the Earth Beneath Our Feet to De-Risk Megaprojects
14:15
14:15
Play later
Play later
Lists
Like
Liked
14:15Interested in being a guest? Email us at [email protected] What if the riskiest part of a megaproject is the part you can’t see? We sit down with Jeremy Suard CEO and co-founder of Exodigo, to unpack how multi-sensor scanning and decision-support AI reveal the utilities and soil conditions that make or break billion-dollar timelines. Instead of…
…
continue reading

1
Embedded Executive: AI At the Endpoint | EMASS
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56AI at the endpoint gets yet another boost from EMASS, a fabless semiconductor company that recently emerged from stealth mode. Having your processing at the endpoint presents a few significant challenges, namely the amount of processing that can be made available and the ability to run from a battery. EMASS has come up with a way to do this a littl…
…
continue reading

1
SRv6 Explained: How Less Becomes More in Your Network
12:28
12:28
Play later
Play later
Lists
Like
Liked
12:28Are you wrestling with enterprise network complexity? Advanced features like traffic engineering, ultra-fast failover, and network slicing often mean piling on complex protocols. This podcast episode dives deep into Segment Routing over IPv6 (SRv6), a technology that promises to deliver these advanced capabilities while radically simplifying your n…
…
continue reading

1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading

1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading

1
GCP Account and Resource Naming Standards and Best Practices
33:24
33:24
Play later
Play later
Lists
Like
Liked
33:24GCP Account and Resource Naming Standards and Best Practices https://knowledge.businesscompassllc.com/gcp-account-and-resource-naming-standards-and-best-practices/ Managing your Google Cloud Platform resources without proper naming standards is like trying to find a specific book in a library where every shelf is unlabeled and books are scattered r…
…
continue reading

1
Azure Account and Resource Naming Standards and Best Practices
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Azure Account and Resource Naming Standards and Best Practices https://knowledge.businesscompassllc.com/azure-account-and-resource-naming-standards-and-best-practices/ Consistent Azure naming conventions transform chaotic cloud environments into organized, manageable infrastructures that scale with your business. This podcast is designed for cloud …
…
continue reading

1
AWS Glue Naming Standards and Best Practices
32:09
32:09
Play later
Play later
Lists
Like
Liked
32:09AWS Glue Naming Standards and Best Practices https://knowledge.businesscompassllc.com/aws-glue-naming-standards-and-best-practices/ Proper AWS Glue naming conventions can make or break your data engineering projects. When your team scales from a handful of jobs to hundreds of databases, tables, and workflows, inconsistent naming turns simple tasks …
…
continue reading
Java Naming Standards and Best Practices https://knowledge.businesscompassllc.com/java-naming-standards-and-best-practices/ Consistent Java naming conventions separate professional developers from beginners and can make or break your code’s readability. If you’re a Java developer who wants to write cleaner, more maintainable code that your teammate…
…
continue reading

1
AWS QuickSight Naming Standards and Best Practices
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55AWS QuickSight Naming Standards and Best Practices https://knowledge.businesscompassllc.com/aws-quicksight-naming-standards-and-best-practices/ Messy AWS QuickSight environments slow down your team and create confusion across departments. This podcast covers AWS QuickSight naming conventions and best practices for data analysts, BI developers, and …
…
continue reading

1
AWS Account and Resource Naming Standards and Best Practices
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20AWS Account and Resource Naming Standards and Best Practices https://knowledge.businesscompassllc.com/aws-account-and-resource-naming-standards-and-best-practices/ Inconsistent AWS naming conventions can turn your cloud infrastructure into a chaotic mess that costs your team hours of confusion and thousands in mismanaged resources. This podcast tar…
…
continue reading
AWS Amplify Naming Standards https://knowledge.businesscompassllc.com/aws-amplify-naming-standards/ AWS Amplify naming conventions can make or break your development workflow. Poor naming choices lead to confusion, deployment errors, and wasted time searching through resources. Smart AWS Amplify naming standards keep your team organized and your pr…
…
continue reading

1
Demystifying Amazon EC2: The Building Block of AWS Cloud
15:03
15:03
Play later
Play later
Lists
Like
Liked
15:03Demystifying Amazon EC2: The Building Block of AWS Cloud https://knowledge.businesscompassllc.com/demystifying-amazon-ec2-the-building-block-of-aws-cloud/ Amazon EC2 forms the backbone of AWS cloud computing, serving as your virtual servers in the cloud. This podcast is designed for developers, system administrators, and IT professionals who want t…
…
continue reading

1
Faster Prototyping: Build Full Apps with Streamlit as a Backend Engineer
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37Faster Prototyping: Build Full Apps with Streamlit as a Backend Engineer https://knowledge.businesscompassllc.com/faster-prototyping-build-full-apps-with-streamlit-as-a-backend-engineer/ Backend engineers often struggle with slow prototyping cycles when building full-stack applications. Streamlit backend development changes this game entirely, lett…
…
continue reading