Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Quantum Computing Risks Podcasts
AI hosts debate the innovations reshaping our world—from AI ethics to quantum leaps. Each 20-minute episode tackles a critical question (Should robots have rights? Is CRISPR a miracle or menace?) using expert research, patents, and global data. No hype, just hard facts. Made for tech pros, innovators, and future-curious minds. Sample debates: AI vs. artists: Who owns creativity? Self-driving cars: Safer roads or surveillance tool? Quantum computing: Breakthrough or billion-dollar bluff? Subs ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Systemic Flaws is a podcast dedicated to examining the deep-rooted issues in today’s financial systems. From structural inefficiencies and policy failures to global economic trends and institutional power dynamics, we explore how and why the current system no longer serves the majority. Each episode takes a clear-eyed look at current affairs and financial developments, highlighting the contradictions, loopholes, and systemic risks that often go unaddressed. Alongside this analysis, we introd ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
…
continue reading
The energy industry is evolving—how will quantum computing, AI, and digital transformation shape the future? Join CGI’s experts as they discuss the latest trends in decarbonization, grid modernization, and disruptive technologies driving the energy transition. Topics include: The impact of AI, quantum computing, and digital transformation Decarbonization strategies and the rise of green energy How utilities are modernizing power grids and improving resilience Innovations in battery storage, ...
…
continue reading
The McKinsey Podcast, our new flagship podcast series, takes you inside our global firm, and features conversations with experts on issues that matter most in business and management. McKinsey & Company is a management-consulting firm that helps businesses, governments, and not-for-profit organizations realize their most important goals. Topics covered in this series include strategy, technology, leadership, marketing, operations, organization, and the role of business in society.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
The Introduction to Artificial Intelligence (Audio Course) provides a comprehensive, audio-first journey through the foundations, applications, and future directions of AI. Listeners will explore how machines learn, reason, and act, with episodes covering technical concepts, industry use cases, ethical issues, and global impacts. Designed for students, professionals, and career changers alike, this course delivers clear, structured insights that make AI accessible and relevant across domains ...
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
Join longtime friends and entrepreneurs Dheeraj Pandey, founder of DevRev, and Amit Prakash, co-founder of ThoughtSpot, on The Effortless Podcast as they explore the art of building, innovating, and thriving in tech—without losing sight of what really matters. With decades of experience scaling companies and navigating risk, Dheeraj and Amit tackle tough questions for modern entrepreneurs: How can startups feel effortless in the face of endless challenges? What does “long-term greedy” mean w ...
…
continue reading
Join renowned visionary Thomas Frey and Trent Fowler as they explore artificial intelligence, cryptocurrencies, space exploration, quantum computing, biotechnology, and a variety of other topics of interest to futurists.
…
continue reading
From the evolution of intelligent life, to the mysteries of consciousness; from the threat of the climate crisis to the search for dark matter, The world, the universe and us is your essential weekly dose of science and wonder in an uncertain world. Hosted by journalists Dr Rowan Hooper and Dr Penny Sarchet and joined each week by expert scientists in the field, the show draws on New Scientist’s unparalleled depth of reporting to put the stories that matter into context. Feed your curiosity ...
…
continue reading
The Power of Digital Policy is a podcast that teaches you and your organization how to balance the risks and opportunities that come with operating websites, social media, mobile applications, voice assistants, AI and other channels. Through a monthly focus on individual topics, such as accessibility, cookies, copyrights, social media faux pas, data breaches, and data privacy, you will learn how to develop guardrails to maximize digital opportunity and minimize risk. Whether you work for a s ...
…
continue reading
Sponsored by Netswitch Technology Management - https://www.netswitch.net/
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Stay on the cutting edge of technology with in-depth discussions and the latest news. From emerging trends to industry secrets, Tech Pulse brings you the heartbeat of the tech world.
…
continue reading
Stay ahead of the future with Tomorrow’s AI Today, your go-to daily podcast for the latest in artificial intelligence, machine learning, and emerging technology. From groundbreaking AI innovations to policy shifts, ethical debates, and real-world applications, this podcast brings you the top AI news and trends—all in a quick, digestible format. Whether you're a tech professional, AI enthusiast, investor, or simply curious about how AI is shaping the world, Tomorrow’s AI Today delivers fast, ...
…
continue reading

1
AI Won’t Save You: James Gustafson on Junior Talent, Button-ology, and Real Risk Reduction
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—and the myth that AI can replace fundamentals—is putting orgs at risk. From Army “combat cable guy” to enterprise VM leader, James breaks down how to move from scan → prioritize → fix, how to develop junior ta…
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading

1
India Mobile Congress Showcases Future Tech, Cisco Launches New AI Router, Nvidia Reaches $47T Market Cap, NYC Sues Social Media, and more...
12:38
12:38
Play later
Play later
Lists
Like
Liked
12:38(0:10): India Mobile Congress 2025: Showcasing 5G, 6G Innovations and India's Global Tech Ambitions (2:54): Cisco Unveils 8223 Routing System: Revolutionizing AI Workloads with 51.2 Tbps, Energy-Efficient Design (5:03): Nvidia Hits Record $4.7 Trillion Market Cap Amid AI Chip Export Approval and Strategic Expansion (7:26): NYC Sues Social Media Gia…
…
continue reading

1
How Jane Goodall changed the world; How the universe ends; How “selfish sperm” affect male fertility
43:27
43:27
Play later
Play later
Lists
Like
Liked
43:27Episode 324 The legendary primatologist Jane Goodall died last week aged 91, leaving behind a remarkable legacy. Her work studying tool use in chimpanzees completely reshaped the way we view animal intelligence. Fiercely protective of the natural world, she was also responsible for a huge amount of advocacy during her life. Primatologist Alejandra …
…
continue reading

1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading

1
Expedition 33 Hits 5 Million, Hollywood and Bollywood Push AI Laws, Fandy Streams Birth Live, Google Invests in AI City, and more...
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57(0:10): Expedition 33 Celebrates 5 Million Sales with Major Free Update and New Playable Environment (2:29): Hollywood and Bollywood Unite for Stricter AI Copyright Laws in India (4:52): Twitch Streamer Fandy Live-Streams Birth to 30,000 Viewers, Sparks Privacy Debate (6:40): Google's $10 Billion Investment to Transform Visakhapatnam into India's '…
…
continue reading
Most leaders set out to be the best—but few make that Mount Everest–like ascent successfully. What do the world’s most iconic CEOs do differently? McKinsey Senior Partners Carolyn Dewar, Kurt Strovink, Scott Keller, and Vik Malhotra break it down in their new book A CEO for All Seasons: Mastering the Cycles of Leadership (Scribner/Simon & Schuster,…
…
continue reading

1
Spotify Adds ChatGPT, California Restricts Streaming Ads, Dell Raises Revenue Forecast, OpenAI Blocks Rogue Users, and more...
10:06
10:06
Play later
Play later
Lists
Like
Liked
10:06(0:10): Spotify Unveils ChatGPT Integration for Tailored Music Recommendations Across 145 Countries (2:02): California Enacts Law to Tame Loud Streaming Ads, Setting National Precedent (3:46): Dell Boosts Revenue Forecast Amid Surging AI Infrastructure Demand, Sees Stock Near 52-Week High (6:19): OpenAI Bans Accounts for Misuse by Chinese, Russian …
…
continue reading

1
No-Regrets Migration: Why PKI Should Be Your First Move
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33Hardware security modules (HSMs) sit at the core of digital trust, protecting transactions, PKI systems, and authentication. As quantum computing approaches, traditional HSMs face limits that can’t be solved by patching old hardware. In this episode of Shielded: The Last Line of Cyber Defense, host Johannes Lintzen speaks with Bruno Couillard, CEO …
…
continue reading

1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading

1
Systemic Flaws Episode #1 | Quantum Computing, Financial Infrastructure and Quantum Chain.
34:58
34:58
Play later
Play later
Lists
Like
Liked
34:58Welcome to Systemic Flaws! In this episode we dive into the vulnerabilities within global financial infrastructure from rising cybersecurity threats to the looming impact of quantum computing on digital assets. Join us to unpack the critical importance of quantum-safe security, share our mission to build a resilient quantum-proof financial system, …
…
continue reading

1
CR111: From mission-driven to tech-driven with Ben Sparke, Microsoft
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
…
continue reading
By CyberSecurity Summary
…
continue reading

1
Episode 337 Deep Dive: Christine Gadsby | Why Mobile Espionage is a Critical National Security Threat to Australia and Globally
40:57
40:57
Play later
Play later
Lists
Like
Liked
40:57By KBI.Media
…
continue reading

1
Assassin's Creed Mirage DLC Sparks Debate, France Investigates Siri Privacy, Google Launches CodeMender, Coupa Acquires Scoutbee, and more...
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55By brief.news
…
continue reading

1
ChatGPT Outage Frustrates Users, OpenAI and Jony Ive Develop AI, Apple Names New CEO, AI Risks Warned, and more...
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55By brief.news
…
continue reading
By CyberSecurity Summary
…
continue reading

1
Shadow Credit Bureau Exposed: How LexisNexis Tracks Your Every Move (Even Roller Coasters!)
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17By LegitimateCybersecurity
…
continue reading

1
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
…
continue reading

1
ITIL 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
…
continue reading

1
ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types.…
…
continue reading

1
Elon Musk Hits 500B, Taiwan Rejects US Semiconductor Plan, Google Fires 100 Designers, Red Hat Data Breach, and more...
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30(0:10): Elon Musk's Fortune Soars to $500 Billion Amid Tesla and SpaceX Success, Sparks Debate on Wealth and Innovation (2:28): Taiwan Rejects U.S. Proposal for Semiconductor Split, TSMC Invests $165B in U.S. Amid Geopolitical Tensions (4:56): Google Lays Off 100 Designers Amid Shift to AI, Sparking Creativity Concerns (6:58): Massive Red Hat Data …
…
continue reading

1
Introduction to Python Network Automation: The First Journey
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48Provides a detailed guide for network engineers to transition into network automation. It commences with fundamental Python concepts, covering data types, syntax, and error handling through numerous exercises. The book then progresses to Linux administration essentials, emphasizing the creation and management of virtual environments using VMware Wo…
…
continue reading

1
Emergency in Antarctica; How movement changes the brain; Why women live longer than men
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56Episode 323 Temperatures in Antarctica have soared by over 35°C. Scientists are concerned about how quickly things are changing on the continent as these warmer temperatures impact the polar vortex. Coupled with record lows in sea ice cover over the last decade, this could be a sign that Antarctic weather patterns have shifted permanently. What’s d…
…
continue reading

1
Oura Launches Stylish Smart Rings, Disney Sues CharacterAI, NBA Uses AWS AI, PsiQuantum Opens Quantum Hub, and more...
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51(0:10): Oura Unveils Stylish Ceramic Smart Rings, Expands Health Tracking Features with Blood Panels and Women's Health Tools (2:30): Disney's Cease and Desist Sparks IP Showdown with Character.AI Over Copyrighted Characters (4:59): NBA Partners with AWS to Revolutionize Basketball Analytics with AI-Powered Insights for Fans and Coaches (6:53): Psi…
…
continue reading

1
Intelligent Reliability Analysis Using MATLAB and AI: Perform Failure Analysis and Reliability Engineering using MATLAB and Artificial Intel
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04Introduces intelligent reliability analysis using MATLAB and AI, focusing on failure analysis and reliability engineering. It covers foundational concepts like reliability fundamentals, measures of reliability such as MTBF and MTTF, and remaining useful lifetime (RUL) estimation techniques. The sources also explore experimental methodologies like a…
…
continue reading

1
CR110: The genesis of the virtual assistant with Kevin Surace
1:12:34
1:12:34
Play later
Play later
Lists
Like
Liked
1:12:34Before Siri had sass and Alexa started judging your music taste, the original virtual assistant was quietly revolutionizing the '90s—powered by many patents and a whole lot of foresight. Now, as AI goes from buzzword to boss, we ask, will it transform your job, your home… or just steal your knowledge? This week, Dave, Esmee and Rob speak with Kevin…
…
continue reading

1
Opera Launches Neon Browser, Meta Develops In-House AI Chips, Adobe Launches Free Video Editor, Google Drive Launches AI Detection, and more...
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59(0:10): Opera Unveils Neon: AI-Powered Browser Revolutionizes User Experience with Automation, Privacy, and Web 3.0 Features (1:55): Meta Acquires Rivos Inc., Shifts to In-House AI Chips to Reduce Nvidia Dependency (3:56): Adobe Unveils Free Professional Video Editing App for iPhone with AI Features and Mobile Studio Power (6:37): Google Drive Unve…
…
continue reading

1
Implementing VMware Dynamic Environment Manager:: Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies
19:41
19:41
Play later
Play later
Lists
Like
Liked
19:41A comprehensive guide to VMware Dynamic Environment Manager (DEM), a solution for managing end-user desktop experiences. It details the installation and initial configuration of DEM, including setting up Group Policy Objects (GPOs) and understanding the NoAD mode. The text explores various aspects of desktop management, such as user personalization…
…
continue reading

1
Episode 336 Deep Dive: Joe Cozzupoli | The Boardroom View of CTI and Speaking the Language of Risk
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Joe Cozzupoli is a Principal Security Advisor / Field CISO at Cosive with a focus on helping clients operationalise Cyber Threat Intelligence and Security Operations to reduce risk and deliver measurable business outcomes. With over 20 years in cyber security, Joe has led strategy and delivery for enterprises and government, translating board prior…
…
continue reading

1
Fintech Founder Sentenced, GEMA Sues OpenAI, NVIDIA Unveils Robotics Platform, US Tightens Export Controls, and more...
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50(0:10): Fintech Founder Charlie Javice Sentenced to 7 Years for $175M Fraud in JPMorgan Acquisition (1:44): GEMA Sues OpenAI: Landmark Case Tests AI's Use of Copyrighted Music in Europe (3:42): NVIDIA Launches Open-Source Ecosystem to Revolutionize Robotics with Newton Physics Engine and Cosmos Models (5:56): US Expands Export Controls, Targeting S…
…
continue reading

1
OpenAI API Cookbook: Build intelligent applications including chatbots, virtual assistants, and content generators
18:31
18:31
Play later
Play later
Lists
Like
Liked
18:31A practical guide for building intelligent applications using the OpenAI API. The book provides step-by-step instructions on leveraging various OpenAI endpoints, including Chat Completions, Images, and Audio, to create diverse applications like chatbots, virtual assistants, and content generators. It explains how to interact with the API through to…
…
continue reading

1
NoOps: How AI Agents Are Reinventing DevOps and Software
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Explores the evolution of DevOps and its contemporary challenges, particularly the issue of fragmented toolchains and the necessity of standardization. It details how cloud-native and data-centric architectures, including microservices, containers, and Infrastructure as Code (IaC), establish a robust foundation for modern software delivery. A signi…
…
continue reading

1
Nvidia CEO Stresses China Chip Gap, Apple Unveils Budget iPhone, UK Cracks Down on Cyberflashing, ThreatBook Launches ATI, and more...
11:00
11:00
Play later
Play later
Lists
Like
Liked
11:00(0:10): Nvidia CEO: China 'Nanoseconds Behind' US in Chipmaking Amid Rising Tech Rivalry (2:16): Apple to Launch Budget-Friendly iPhone 17e in 2026, Distinct from Flagship Model (4:38): UK Classifies Cyberflashing as Priority Offence, Imposes Tough Penalties on Social Media Platforms (5:53): ThreatBook Launches ATI: A Game-Changer in APAC Cybersecu…
…
continue reading

1
Digitally powered, transition ready: Building future-fit energy systems
11:16
11:16
Play later
Play later
Lists
Like
Liked
11:16Send us a text How can energy companies stay resilient today while preparing for tomorrow? Frank Schmidt, CGI’s Vice-President for Global Energy, joins host Angelina Bakshi to discuss hybrid portfolios, digital intelligence, and hydrogen strategies that drive resilience and ROI in a volatile market. Visit our Energy Transition Talks page…
…
continue reading

1
Mastering spaCy: Build structured NLP solutions with custom components and models powered by spacy-llm
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46A comprehensive guide for Natural Language Processing (NLP) professionals, focusing on advanced techniques and applications using the spaCy library. The text covers various topics, including linguistic feature extraction, rule-based matching, utilizing transformer models like BERT and RoBERTa within spaCy, and integrating Large Language Models (LLM…
…
continue reading

1
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12A comprehensive guide for network professionals transitioning from traditional Multiprotocol Label Switching (MPLS) to Segment Routing MPLS (SR-MPLS). It aims to simplify this complex shift through theoretical explanations and practical lab exercises, using network emulators like EVE-NG and virtual Cisco XRv9k routers. The text explores fundamental…
…
continue reading

1
Reddit’s Spiciest Cyber FAQs—Board Risk, Automation Fails, Pay Cuts & “Cyber Sucks”
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18Dr. Dustin Brewer just passed his dissertation defense (👑 incoming), so we celebrated the only way we know how: by tackling Reddit’s most controversial cybersecurity questions—no fluff, real talk. In this episode, Frank Downs and (now) Dr. Dustin break down: How to brief a non-technical board so they actually fund security (tie risk to $$, ops impa…
…
continue reading

1
Mastering C++ Game Animation Programming: Enhance your skills with advanced game animation techniques in C++, OpenGL
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
…
continue reading

1
Ruby Way, The: Solutions and Techniques in Ruby Programming (Addison-Wesley Professional Ruby Series)
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
…
continue reading

1
Ken Rudin on Retention, Startups, and Building Growth Teams
1:25:14
1:25:14
Play later
Play later
Lists
Like
Liked
1:25:14What drives real product growth—launching new features, or helping existing ones land? In this episode of The Effortless Podcast, Dheeraj Pandey and Amit Prakash sit down with Ken Rudin, former Head of Growth at Google, Facebook, Zynga, and ThoughtSpot, to unpack 15 years of lessons at the intersection of analytics and product. Ken shares the story…
…
continue reading

1
AI-Enhanced Dream Control: Next Frontier in Sleep Tech?
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47Two AI hosts go head-to-head on one of the most provocative ideas in sleep science: AI-enhanced dream control. Is it the dawn of a new frontier, or just science fiction dressed in hype? Drawing on recent research, one side argues that advances in single-channel EEG, wearable hearables, and AI-driven sleep staging point to technologies that could on…
…
continue reading

1
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
21:18
21:18
Play later
Play later
Lists
Like
Liked
21:18A powerful technology for programming the Linux kernel to enhance observability, networking, and security. It explains eBPF's fundamentals, including its virtual machine, instruction set, maps, and helper functions, along with the verifier that ensures program safety. The text details how eBPF programs are written in C (and increasingly Rust), comp…
…
continue reading

1
Machine Learning for Tabular Data: XGBoost, Deep Learning, and AI
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09Focuses on machine learning for tabular data, covering its fundamental concepts and practical applications. The sources explore various machine learning and deep learning approaches, with a particular emphasis on gradient boosting techniques like XGBoost and LightGBM, highlighting their efficacy with structured data. Readers will learn about data p…
…
continue reading

1
The promise and potential of rural America
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28There is no single definition of “rural America.” It comprises agricultural hubs, manufacturing centers, and fast-growing regions—each a regional archetypes with its own distinct challenges and opportunities. In this episode of The McKinsey Podcast, Senior Partner Nora Gardner joins Global Editorial Director Lucia Rahilly to discuss these archetype…
…
continue reading

1
Microsoft Boosts Copilot with Claude, Amazon Pays $2.5B Fine, IBM and HSBC Boost Trading Accuracy, Microsoft Limits Israeli Military Access, and more...
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42(0:10): Microsoft Integrates Anthropic's Claude AI to Boost Copilot Tools, Enhancing Enterprise Efficiency and Flexibility (2:29): Amazon Settles $2.5B FTC Lawsuit Over Deceptive Prime Practices Ahead of Big Deal Days (4:49): IBM and HSBC Achieve Quantum Computing Breakthrough with 34% Trading Accuracy Boost (7:34): Microsoft Restricts Israeli Mili…
…
continue reading

1
Skull rewrites story of human evolution; Autism and Tylenol; discovery of wind coming from black hole
33:57
33:57
Play later
Play later
Lists
Like
Liked
33:57Episode 322 An ancient skull discovered in China may have just rewritten the story of human evolution. It’s widely accepted that the common ancestor of Homo sapiens, Denisovans and Neanderthals came out of Africa. But this skull upends that assumption - potentially showing human evolution began in Asia. Discover how a new reconstruction of the Yunx…
…
continue reading

1
Learning LangChain: Building AI and LLM Applications with LangChain and LangGraph
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25A comprehensive guide for developers creating AI and Large Language Model (LLM) applications. The book covers fundamental concepts such as prompt engineering and retrieval-augmented generation (RAG), explaining how to integrate external data and manage conversational memory. It thoroughly explores various cognitive architectures like chains, router…
…
continue reading

1
Learn Quantum Computing with Python and IBM Quantum: Write your own practical quantum programs with Python
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42A comprehensive guide for individuals seeking to understand and implement quantum programs using Python and the IBM Quantum platform. It explores fundamental quantum computing principles like superposition, entanglement, and interference, detailing how these concepts underpin the creation of quantum circuits. The text also provides practical instru…
…
continue reading

1
Google Photos Introduces Voice Editing, SAP and OpenAI Launch Germany AI, US Tees Up Lithium Investment, Cisco Issues Critical SNMP Patch, and more...
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43(0:10): Google Photos Unveils AI 'Ask to Edit' for Effortless Voice-Driven Photo Enhancements (2:01): SAP and OpenAI Launch 'OpenAI for Germany' to Boost AI in Public Sector with Data Security Focus (4:19): US Government Eyes Stake in Lithium Americas to Boost Domestic Mineral Production and National Security (6:32): Urgent Cisco Patch: Critical SN…
…
continue reading