A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Software Development Industry Podcasts
SPaMCAST explores the varied world of software process improvement and measurement. The cast covers topics that deal with the challenges found in information technology organizations as they grow and evolve.
…
continue reading
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑🏫 Courses I Te ...
…
continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
Exploring the intersection of digital infrastructure and the humans who depend on it. https://underlay.show
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
A Podcast About Cloud Native Software Development, AWS, and Distributed Systems
…
continue reading
Each episode Chris and Chris will be discussing topics and news from the world of SQL Server, while enjoying and chatting about beer! So, grab yourself a beer and tune in, cheers.
…
continue reading
For solo professionals who want to make more and work less without hiring.
…
continue reading
The a16z Podcast discusses tech and culture trends, news, and the future – especially as ‘software eats the world’. It features industry experts, business leaders, and other interesting thinkers and voices from around the world. This podcast is produced by Andreessen Horowitz (aka “a16z”), a Silicon Valley-based venture capital firm. Multiple episodes are released every week; visit a16z.com for more details and to sign up for our newsletters and other content as well!
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
The Sudo Show covers topics ranging from Open Source in business to deep dives into complex technoloyg. The Sudo Show is a proud member of the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Level-Up Engineering brings you actionable management insights straight from top tech leaders. Each episode tackles real challenges faced by engineering managers—like hiring, motivating teams, and scaling organizations—and shares how they have navigated them. Discover best practices in management and leadership to master the art of understanding people and organizations, just as well as you understand code. Brought to you by **Apex Lab**, a software development agency creating stress-free, e ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The software industry has a short memory. It warps good ideas, quickly obfuscating their context and intent. Dead Code seeks to extract the good ideas from the chaos of modern software development. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The podcast that covers the latest news, notes, commentary and listener questions on Microsoft cloud technologies including Windows Azure, Office 365 and SharePoint.
…
continue reading
Learning How To Program Robots With ROS
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Interviews & insights with experienced developer's across all aspects of App Development. Whether you're a veteran developer or just getting started - listen weekly as I go in depth with professionals on topics ranging from Flutter, Cyber Security, Freelancing, Android, iOS & much much more!
…
continue reading
Inside iOS dev is a weekly show about real world iOS development. Your hosts, Alex Bush and Sandeep Aggarwal, draw from their experiences ranging from 4+ year old legacy codebases, to small startup green field projects, to working on apps at places like Uber, Wayfair, and Upkeep with millions of active users. They discuss everything from implementing specific features, to creating flexible designs, to utilizing refactoring techniques, and more. This is THE show for professional iOS developers.
…
continue reading
Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
…
continue reading
Deep-dive discussions with the smartest developers we know, explaining what they're working on, how they're trying to move the industry forward, and what we can learn from them. You might find the solution to your next architectural headache, pick up a new programming language, or just hear some good war stories from the frontline of technology. Join your host Kris Jenkins as we try to figure out what tomorrow's computing will look like the best way we know how - by listening directly to the ...
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Five times winner of the Publisher Podcast Awards, including Best Technology Podcast, Engineering Matters celebrates the work of engineers who use ingenuity, practicality, science, theory and determination to build a better world. In the UK alone 5.7million people work in engineering related enterprises from manufacturing and agriculture to construction and transportation. Their work ensures that the country has sustainable power supplies, better connectivity between cities, increasing effic ...
…
continue reading
Dev Interrupted is the go-to podcast for software engineering leadership. Each week, hosts Andrew Zigler, Ben Lloyd Pearson, and Dan Lines sit down with industry experts to explore the strategies, struggles, and stories behind high-performing software teams. Paired with weekly industry news coverage, the conversations dive deep into the real challenges that define excellence in modern tech.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Security Unlocked presents The BlueHat Podcast From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions. Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and crea ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading

1
Amazing Apps - learn how to build agile Dynamics 365 and Power Platform business apps using Scrum
Neil Benson
Amazing Apps is for Microsoft Dynamics 365 and Power Platform builders who want to use the Scrum framework to build amazing business apps that everyone will love. The podcast is hosted by Microsoft MVP, Neil Benson, and produced by Customery. [Dynamics365, D365, Power Apps, PowerApps, Power Pages, Power Apps Portals, Power Automate, Flow, Power Virtual Agents, PVA, PowerBI]
…
continue reading
Each episode we discuss the latest news regarding how to reduce the emissions of software and how the industry is dealing with its own environmental impact. Brought to you by The Green Software Foundation. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The adventures of Matt Lawrence and Mike Karan through the world of web development, web design, and small business management. As web development agency owners for the better part of a decade, they’ve worked with all sorts of technologies, through the rise of responsive web design, the revolution of serverless computing, and the popularity gain of many no-code tools for small business owners. They commonly discuss foundational web development technologies like HTML, CSS, and JavaScript - in ...
…
continue reading

1
Kristin Strand: Be firm in your goals. [Consultant] [Career Notes]
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56Please enjoy this encore of Career Notes. Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of pr…
…
continue reading

1
JAGS LABScon 2025 keynote: Steps to an ecology of cyber
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00Three Buddy Problem (Episode 68): The buddies are trapped in timezone hell with cross-country travel this week. In this special episode, we present Juan Andres Guerrero-Saade's LABScon 2025 keynote-day presentation on the state of cybersecurity and why this phase of our collective project has failed, and how to build something smarter, more sustain…
…
continue reading

1
Web News: A ChatGPT Nightmare (AI Etiquette)
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24In this edition of the HTML All The Things Web News, Matt and Mike discuss a viral Reddit post where a web developer says their manager’s use of ChatGPT has made their job a nightmare. They unpack whether this is the new workplace reality or a case of AI overstepping its bounds. Along the way, they share their own client experiences, talk AI etique…
…
continue reading

1
Smile for the malware. [Research Saturday]
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style too…
…
continue reading

1
7MS #697: Pwning Ninja Hacker Academy – Part 4
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22Today your pal and mine Joe “The Machine” Skeen pwn one of the two Ninja Hacker Academy domains! This pwnage included: Swiping service tickets in the name of high-priv users Dumping secrets from wmorkstations Disabling AV Extracting hashes of gMSA accounts We didn’t get the second domain pwned, and so I was originally thinking about doing a part 5 …
…
continue reading

1
The Good and Bad of Choosing Measurements - Traps and Opportunities of Measuring What Matters
15:01
15:01
Play later
Play later
Lists
Like
Liked
15:01In this episode, I dive into the management mantra that "what is measured is managed" and explain why this simple assertion often leads to a complex trap. We discuss why the act of measuring team productivity is never neutral—it's an intervention that immediately changes behavior, often resulting in unintended consequences like gaming the metrics. …
…
continue reading

1
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland... - SWN #521
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-521
…
continue reading
Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social med…
…
continue reading

1
HN801: Will a Natural Language Interface (NLI) Replace Your CLI?
59:51
59:51
Play later
Play later
Lists
Like
Liked
59:51Could an LLM or some kind of an AI-driven language model, such as a natural language interface, someday replace our beloved CLI? That is, instead of needing to understand the syntax of a specific vendor’s CLI, could a language model allow network operators to use plain language to get the information they need or the... Read more »…
…
continue reading
There are cases where the backend may need to close the connection to prevent unexpected situations, prevent bad actors or simply just free up resources. Closing a connection gracefully allows clients and backends to clean up and finish any pending requests. In this episode of the backend engineering show I discuss graceful connections in both HTTP…
…
continue reading

1
932: Should You Build or Buy Your AI Solution? With Larissa Schneider
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10Larissa Schneider speaks to Jon Krohn in this Feature Friday about finding the right time to invest in AI solutions, and when it’s better to build them yourself. She discusses her work leading global strategy and operations at Unframe, and how they raised $50 million in venture capital since the company’s launch in March 2025. Additional materials:…
…
continue reading

1
Marc Andreessen on the State of Film and Hollywood
1:07:46
1:07:46
Play later
Play later
Lists
Like
Liked
1:07:46Hollywood is going through a major cultural and creative reset, and Marc Andreessen thinks it’s long overdue. In this episode of Monitoring the Situation, Marc joins Erik Torenberg and Katherine Boyle to dissect the past decade of filmmaking, from the rise of “the message” in every movie to the return of genuine comedy and art. They cover the post-…
…
continue reading

1
Episode 542: Yuriy Shyyan on owning your own Cloud.
1:02:34
1:02:34
Play later
Play later
Lists
Like
Liked
1:02:34Matt Ray talks to Yuriy Shyyan, the Director of Cloud Systems Architecture for OpenMetal. They discuss the cost of running your enterprise in the public cloud, high school hacking, building a business on OpenStack, and recognizing that cloud credits are an invitation to purchase a timeshare. Show Links OpenMetal.io Contact Yuriy Shyyan LinkedIn: Yu…
…
continue reading

1
Risky Biz Soap Box: Why Mastercard became a cybersecurity vendor
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49In this sponsored Soap Box edition of the Risky Business podcast, host Patrick Gray chats with Mastercard’s Executive Vice President and Head of Security Solutions, Johan Gerber, about how the card brand thinks about cybersecurity and why it’s aggressively investing in the space. After listening to this interview you’ll understand why the credit ca…
…
continue reading

1
AI, EDR, and Hacking Things - PSW #896
2:04:54
2:04:54
Play later
Play later
Lists
Like
Liked
2:04:54First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
…
continue reading
F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces …
…
continue reading

1
#348 Modelling Distributed Energy Storage
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12In Europe, and around the world, renewable electricity generation is being built at pace. However, these sources of energy create a new challenge: they are intermittent, and will not generate power on dark, windless days. One solution to the challenge is to install grid scale storage. If you’re building an offshore wind farm, with a view to serving…
…
continue reading

1
Learning How to Learn: Mastering the Cyber Fundamentals with Rich Greene
25:38
25:38
Play later
Play later
Lists
Like
Liked
25:38The real edge in cybersecurity isn’t found in new tools, it’s built through timeless fundamentals and a mindset that never stops learning. In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable…
…
continue reading

1
Keith Rabois: Israel, OpenAI, Opendoor, and DOGE
49:08
49:08
Play later
Play later
Lists
Like
Liked
49:08From politics to technology to real estate, Keith Rabois has bold predictions for America’s next decade. In this conversation with Erik Torenberg, Keith breaks down why he believes the U.S. is entering a new economic expansion driven by AI, productivity, and sovereign technology. They discuss how AI could lift GDP growth to 5%, why sovereign AI pro…
…
continue reading
Guest host Anne Currie speaks with Karthik Vaidhyanathan, Assistant Professor at IIIT Hyderabad, about integrating sustainability into AI development. They discuss how the world can balance digital growth with renewable energy goals and how AI systems can be designed to be energy-efficient rather than energy-intensive. Karthik shares insights from …
…
continue reading

1
What does an AI strategy with humans at the center look like?
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Everyone knows an AI strategy is important — but how do you build one with humans at the center? That's a question Tiankai Feng, Thoughtworks Global Director for Data and AI Strategy, has been pondering ever since the publication of his 2024 book Humanizing Data Strategy. Now, just over a year later, he's outlined his thinking in a follow-up, Human…
…
continue reading
A record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach…
…
continue reading

1
Ben Horowitz and Ali Ghodsi: How to Run a Billion-Dollar Business
1:04:36
1:04:36
Play later
Play later
Lists
Like
Liked
1:04:36By Erik Torenberg, Ali Ghodsi, Ben Horowitz
…
continue reading

1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
continue reading

1
Risky Business #810 -- Data extortion attacks have a silver lining
1:03:12
1:03:12
Play later
Play later
Lists
Like
Liked
1:03:12In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: FBI intervenes in Scattered Spider Salesforce leaksite Clop loots Oracle E-Biz deployments Plus so much more data extortion.. At least it’s not ransomware … we guess? The US still can’t decide who’s gonna be in charge of NSA & Cybercom Cambodian scam…
…
continue reading

1
Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more... - SWN #520
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-520
…
continue reading
Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown…
…
continue reading
For the 300th (!!!!) episode of the podcast, Seth and Ken reminisce on changes to the industry and overall approach to application security since inception. The hosts discussed the evolution of the industry, noting that once-popular approaches like blindly emulating "hip" Silicon Valley security programs and running unmanaged Security Champions Pro…
…
continue reading

1
Is AI Slowing Down? Nathan Labenz Says We're Asking the Wrong Question
1:31:02
1:31:02
Play later
Play later
Lists
Like
Liked
1:31:02Nathan Labenz is one of the clearest voices analyzing where AI is headed, pairing sharp technical analysis with his years of work on The Cognitive Revolution. In this episode, Nathan joins a16z’s Erik Torenberg to ask a pressing question: is AI progress actually slowing down, or are we just getting used to the breakthroughs? They discuss the debate…
…
continue reading

1
931: Boost Your Profits with Mathematical Optimization, feat. Jerry Yurchisin
1:13:12
1:13:12
Play later
Play later
Lists
Like
Liked
1:13:12AI predictions, and how to act on them: Data Science Strategist at Gurobi, Jerry Yurchisin, speaks to Jon Krohn about how mathematical optimization helps enterprises automate decisions for business success and where to find the resources to make it happen. This episode is brought to you by the ODSC, the Open Data Science Conference, by Fabi, by D…
…
continue reading

1
Erin Halper - Pro Tips for Building and Sustaining a Thriving Online Community
57:05
57:05
Play later
Play later
Lists
Like
Liked
57:05Founder of The Upside, Erin Halper, joined me on Ditching Hourly to share her pro tips on creating and sustaining a premium online community. Erin's Links: Erin's community » https://betheupside.com/ Erin's LinkedIn » https://www.linkedin.com/in/erinhalper/ Chapters (00:00) - Introduction and Guest Welcome (00:19) - Erin Halper's Background and The…
…
continue reading

1
The timelessness of vector databases | Pinecone’s Ram Sriharsha
48:16
48:16
Play later
Play later
Lists
Like
Liked
48:16With massive context windows and new agent frameworks, do vector databases still matter? Ram Sriharsha, CTO at Pinecone, joins the conversation to make the definitive case that they're more critical than ever. He explains that at the core of all AI is search, and externalizing this function is non-negotiable for security, auditability, and control.…
…
continue reading

1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
continue reading

1
CSS Crash Course (For Absolute Beginners)
1:05:54
1:05:54
Play later
Play later
Lists
Like
Liked
1:05:54In this episode of the HTML All The Things Podcast, Matt breaks down CSS for absolute beginners. You’ll learn what CSS is, where it goes, and how it makes websites look beautiful. From understanding selectors and specificity to learning why classes beat IDs for flexibility—this crash course keeps things simple, visual, and easy to understand throug…
…
continue reading

1
Columbia CS Professor: Why LLMs Can’t Discover New Science
50:54
50:54
Play later
Play later
Lists
Like
Liked
50:54From GPT-1 to GPT-5, LLMs have made tremendous progress in modeling human language. But can they go beyond that to make new discoveries and move the needle on scientific progress? We sat down with distinguished Columbia CS professor Vishal Misra to discuss this, plus why chain-of-thought reasoning works so well, what real AGI would look like, and w…
…
continue reading

1
New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428
1:43:44
1:43:44
Play later
Play later
Lists
Like
Liked
1:43:44Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
…
continue reading

1
Software Leadership with Jonathan “J.” Tower - Episode 371
35:15
35:15
Play later
Play later
Lists
Like
Liked
35:15Jonathan Tower is known to friends and colleagues simply as “J.” J. is a Microsoft MVP, Telerik Developer Expert, and the founder of Trailhead Technology Partners, a global custom software consultancy. With nearly 25 years of experience in the industry, J. has held roles ranging from senior architect to director of development, and now leads a team…
…
continue reading

1
What Happened to Hacker Culture? [Threat Vector]
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Le…
…
continue reading

1
Age Verification Laws: A Privacy Disaster in the Making
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30In this episode, we discuss the surge of age verification laws spreading across the US, including the recent implementation in Ohio. These laws intend to shield children but come at a significant cost to privacy and cybersecurity. We’ll explore how third-party ID verification companies operate, the risks associated with these systems, and the broad…
…
continue reading