For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Web Security Podcasts
A podcast about web design and development.
…
continue reading
Podcasts from Akamai's Security Team.
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Daniel discusses and explains various topics on computers and technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
Keeping you up to speed with the latest web security news
…
continue reading
Learn how to get the best performance and scale your PostgreSQL database with our weekly shows. Receive the best content curated from around the web. We have a special focus on content for developers since your architecture and usage is the key to getting the most performance out of PostgreSQL.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Freelancing and marketing nuggets for web designers, without the fluff. TheFreelancerPodcast.com
…
continue reading
Everything from security to search tools, traffic to transfers.
…
continue reading
Hosted by Emma and Shi Khai of LongHash Ventures, we chat with the most innovative founders of Web 3.0 building more open, inclusive, and equitable financial and social infrastructure.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
ITech Insights are short easy to understand video's meant to provide further education on many of the technologies we already use in our day to day business, as well as to introduce new and useful tools for saving time, money, and above all aggravation.
…
continue reading
Every week Wayne Scott from brings together a team of technology journalists from www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
The Laravel Community getting together discussing development and life using the world's best framework, Laravel.
…
continue reading
Sharing the work we do around the open web, information security and user privacy is an important role of Mozilla Security. The Mozilla Security Bytes podcast discuss various topics and technologies implemented in Firefox and other Mozilla products and initiatives.
…
continue reading
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
…
continue reading
State Secrets is a weekly interview podcast featuring Cipher Brief experts and national security leaders.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information. Learn more at https://medcurity.com.
…
continue reading
The two TypeScript Fools, Kamran Ayub and Erik Onarheim, get together weekly to bring you news, community highlights, and deep dives into the TypeScript ecosystem. Stay up-to-date on what's happening and learn new things to make you a better TypeScript developer along the way!
…
continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
A Technology Geek Podcast with an EVER so Slight Macintosh Bias!
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
Uptime and performance monitoring made easy.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
continue reading
1
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35A comprehensive guide for security professionals and testers, detailing methodologies for identifying and exploiting numerous web application vulnerabilities. It extensively covers topics like authentication flaws, session management issues, access controls, injection attacks (such as SQL and XML injection), and Cross-Site Scripting (XSS), using to…
…
continue reading
Start your week with a laugh. And yes, it’s work-relevant. Today’s guests, John Fokker, Head of Threat Intelligence, and Jambul Tologonov, Security Researcher at Trellix, have spent years monitoring the dark web and have quite a few stories to tell. They are joining Robby to talk about their concept "Dark Web Roast", a satirical look at cyber crimi…
…
continue reading
In this episode of Scaling Postgres, we discuss my Black Friday / Cyber Monday course deal, the job security that LLMs provide, new Postgres releases and why you should hard your datbase. To get the show notes as well as get notified of new episodes, visit: https://www.scalingpostgres.com/episodes/393-job-security/ Want to learn more about Postgres…
…
continue reading
1
Why Astro Is Winning Developers Over with Sagi Carmel - JSJ 697
1:03:58
1:03:58
Play later
Play later
Lists
Like
Liked
1:03:58In this episode, I sit down with developer and speaker Sagi Carmel to dive deep into Astro, why it’s gaining so much traction, and how it compares to frameworks like Next.js, Nuxt, Remix, and SvelteKit. We explore what makes Astro uniquely powerful — from its server-first approach and island architecture to its simplicity, speed, and ability to int…
…
continue reading
1
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
16:28
16:28
Play later
Play later
Lists
Like
Liked
16:28A deep foundation in blockchain technology, starting with a historical context of money and the centralized systems it relies upon, before introducing the decentralized, trustless model of blockchain. Significant portions detail the operational mechanics of the two leading public blockchains: Bitcoin and Ethereum, covering key concepts such as cryp…
…
continue reading
1
CAUGHT: Biggest Spy in US History--Spies, Lies & Cybercrime
54:07
54:07
Play later
Play later
Lists
Like
Liked
54:07Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
…
continue reading
1
UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)
17:00
17:00
Play later
Play later
Lists
Like
Liked
17:00Focusing on the application of user experience (UX) principles to Extended Reality (XR), which includes Virtual Reality (VR) and Augmented Reality (AR). The content explores the history of XR, the rise of UX design, and how these methodologies are crucial for driving the adoption of immersive technologies in areas like EdTech, MedTech, enterprise, …
…
continue reading
We open by tracking our video money and mocking the chef who quit Elon’s "epic" bacon diner, before diving into the IN THE NEWS segment where plummeting crypto and Nvidia stocks confirm everything is a sham; we cover Bezos’s new $6.2 billion AI flop, a sleeping Tesla Robotaxi driver, and why OpenAI’s new school tools are a Recipe for Idiocracy with…
…
continue reading
1
What Happens in Your BRAIN During Social Engineering Attacks
51:48
51:48
Play later
Play later
Lists
Like
Liked
51:48Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Growth without Interr…
…
continue reading
1
Visual Studio Code for Python Programmers
15:58
15:58
Play later
Play later
Lists
Like
Liked
15:58An extensive table of contents and introductory material for a guide on using the popular code editor for Python development. The source details fundamental setup procedures such as installing Visual Studio Code, configuring a Python interpreter and extensions, and managing core editor features like settings, keybindings, and the Command Palette. F…
…
continue reading
Ryan is joined by David Hsu, CEO and founder of Retool, to explore how AI is transforming the role of a software developer into a software architect, the increasing accessibility of coding for non-engineers, and the importance of placing guardrails and higher-level programming primitives on AI coding assistants. Episode notes: Retool is an enterpri…
…
continue reading
This week, our guest is the ever-delightful Adam Engst of TidBITS. In this episode, he explains what agentic web browsers are and what they are designed to do for you. Adam put five of them through their paces. I don’t want to spoil the story, but he uses phrases like “full cuckoo”, “daydreams in class”, […] The post CCATP #824 — Adam Engst on Can …
…
continue reading
1
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
2:09:41
2:09:41
Play later
Play later
Lists
Like
Liked
2:09:41In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
…
continue reading
1
Give Me Liberty or Linux, Badge Hacking Interview - Bryce Owen - PSW #901
2:09:41
2:09:41
Play later
Play later
Lists
Like
Liked
2:09:41In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Threat actors depl…
…
continue reading
Online Cruelty 05 - Sanctuary or storm The sources consist of excerpts from several audio recordings and supporting documents that primarily revolve around cybersecurity, technology ethics, and personal conflict within online communities, specifically the Cybermidnight Club. One major theme is the strategic use of unfiltered social audio for high-s…
…
continue reading
1
Online Cruelty 04 - Cyber Expert's Community Betrayal Collapse
27:13
27:13
Play later
Play later
Lists
Like
Liked
27:13The sources consist of excerpts from several audio recordings and supporting documents that primarily revolve around cybersecurity, technology ethics, and personal conflict within online communities, specifically the Cybermidnight Club. One major theme is the strategic use of unfiltered social audio for high-stakes discussions, such as one involvin…
…
continue reading
1
Online Cruelty 03 - Cyber Expert's Total Online Collapse
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28The sources consist of excerpts from several audio recordings and supporting documents that primarily revolve around cybersecurity, technology ethics, and personal conflict within online communities, specifically the Cybermidnight Club. One major theme is the strategic use of unfiltered social audio for high-stakes discussions, such as one involvin…
…
continue reading
1
Online Cruelty 02 - Crypto Myth Meets Digital Trauma Forensics
30:20
30:20
Play later
Play later
Lists
Like
Liked
30:20excerpts from several audio recordings and supporting documents that primarily revolve around cybersecurity, technology ethics, and personal conflict within online communities, specifically the Cybermidnight Club. One major theme is the strategic use of unfiltered social audio for high-stakes discussions, such as one involving state corruption and …
…
continue reading
1
Online Cruelty 01 - Psychological Malice Versus System Failure
9:16
9:16
Play later
Play later
Lists
Like
Liked
9:16excerpts from several audio recordings and supporting documents that primarily revolve around cybersecurity, technology ethics, and personal conflict within online communities, specifically the Cybermidnight Club. One major theme is the strategic use of unfiltered social audio for high-stakes discussions, such as one involving state corruption and …
…
continue reading
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
…
continue reading
1
Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Argues that cybersecurity is primarily a behavioral challenge rather than a technological one, emphasizing that people are the cause of nearly all security incidents. The book introduces and elaborates on nine key cybersecurity habits—such as vigilance, skepticism, diligence, and deception—which are presented as actionable behaviors for both indivi…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering s…
…
continue reading
1
Cyber Expert's Community Betrayal Collapse
27:13
27:13
Play later
Play later
Lists
Like
Liked
27:13The Digital Arena as a Social LaboratoryThis research report provides an in-depth analysis of a series of candid, long-form audio conversations to dissect the unwritten rules governing online community formation, conflict resolution, and reputation management. These raw, unfiltered interactions offer a rare opportunity to observe digital social dyn…
…
continue reading
1
Safe Spaces Collapse Alberto's Digital Trauma
1:26:58
1:26:58
Play later
Play later
Lists
Like
Liked
1:26:58Description of the Whole Space, Events, and IronyThe space served as a tumultuous forum where Alberto sought refuge and healing from relentless cyber-harassment, but instead encountered more conflict and chaos, underscoring a deep irony in his reality.Events and SpeakersThe main speakers included Alberto, Helen (Satoshi's Bride), Skykiss, Daby, and…
…
continue reading
1
How AI Is Shaping Modern Security with Mike Armistead | Medcurity Podcast 117
37:41
37:41
Play later
Play later
Lists
Like
Liked
37:41Mike Armistead joins the Medcurity Podcast to discuss the gap between security spending and meaningful outcomes. With decades building and leading cybersecurity companies, he offers a direct look at what actually improves security programs in practice. The conversation with Joe Gellatly covers where AI supports security work and where it falls shor…
…
continue reading
1
Conversation with ESRB on tackling today’s Top Web & App Privacy Risks
1:00:13
1:00:13
Play later
Play later
Lists
Like
Liked
1:00:13Send us a text Get an inside look at how ESRB’s Privacy Certified program uncovers hidden web & app privacy risks like GPC failures, sensitive data collection, misleading banners, misconfigured SDKs, and children’s data violations. In this conversation, Stacy Feuer (SVP, ESRB Privacy Certified) and Vaibhav Antil (CEO, Privado AI) break down: - The …
…
continue reading
1
How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, Ory, said. “But that means we need to rethink authorization from the ground up. It’s not just about who can log in; it’s about who can act, on whose behalf, and under what circumstances.” In the latest episode of T…
…
continue reading
1
Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37These excerpts from the book "Hands-on Data Virtualization with Polybase" provide an extensive look at how to implement data virtualization using PolyBase within SQL Server, including its use in Big Data Clusters and Azure Synapse Analytics. The text thoroughly explains the technical details, prerequisites, and setup procedures for connecting SQL S…
…
continue reading
1
Type Stripping is Stable, Type-safe Music, and Rust Engines Enter the Chat | News | Ep 44
43:11
43:11
Play later
Play later
Lists
Like
Liked
43:11News for the week of November 10, 2025: Node 25 marks type stripping as stable, the downlow on some new Rust-based JavaScript and TypeScript engines, and a new browser for keyboard lovers. From the community: visualize how types work, using .NET Aspire without .NET, type-safe SQL, and an experimental Rust-based type checker. Sponsored by Excalibur.…
…
continue reading
1
Lithuania's Foreign Minister: 'Western Restraint Invites Russian Aggression
22:18
22:18
Play later
Play later
Lists
Like
Liked
22:18Lithuania's Foreign Minister Kęstutis Budrys joins Cipher Brief CEO Suzanne Kelly in Washington with a blunt warning: Western military restraint is encouraging, not deterring, the Kremlin. Budrys explains why Lithuania is raising defense spending to more than 5% of GDP by 2026—the highest in the democratic world—and pushing NATO toward offensive de…
…
continue reading
1
What Happens When AI Collides with MODERN Warfare?
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Question? Text our Studio direct. Join us as we delve into the uncharted territory where artificial intelligence meets modern warfare, exploring the profound implications and potential consequences of this revolutionary intersection. From autonomous drones to predictive analytics, we'll examine how AI is transforming the face of combat and defense …
…
continue reading
1
Is Current DLP Failing Data Security in the Age of Generative AI?
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge. In the recent episode of The Security Strategist Podcast, guest Gidi Cohen, CEO and Co-Founder of Bonfy.AI, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest. They discussed the reasons traditional data los…
…
continue reading
1
Trusted Platform Module (TPM) (noun) [Word Notes]
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Please enjoy this encore of Word Notes. A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link: https://thecyberwire.com/glossary/trusted-platform-module Audio reference link: “TPM (Trusted Platform Module) - Computerphile,” Computerphile, 23 July 2021…
…
continue reading
1
Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15A practical guide for building and deploying DevOps pipelines using various open-source tools. The content focuses heavily on Linux fundamentals, including managing files, directories, users, and permissions, while also introducing modern DevOps practices. Specific technologies covered are VirtualBox and Vagrant for creating environments, core web …
…
continue reading
1
How to create agents that people actually want to use
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07Ryan welcomes Assaf Elovic, head of AI at monday.com, to discuss creating AI tools that users will actually adopt, how they created their Monday Sidekick agent with the user experience in mind, and the opportunities that AI creates for better productivity and more efficiency. Episode notes: monday.com is a work management platform that allows you t…
…
continue reading
1
691: Charts + Graphs, Vibe Coding an App, and Debating Affordances
1:08:59
1:08:59
Play later
Play later
Lists
Like
Liked
1:08:59Show Description What do Balatro streamers do when the game is over, Random in CSS is so hot right now, Dave has a better idea for charts and graphs that would change the world, Quiet UI follow up, Dave tries vibe coding a tennis app and doesn't completely John McEnroe his laptop, Chris wonders about better cursor UI on the web, and debating afford…
…
continue reading
1
100 Times Faster By Skipping! | Scaling Postgres 392
15:52
15:52
Play later
Play later
Lists
Like
Liked
15:52In this episode of Scaling Postgres, we discuss performance improvements related to skip scans, faster backup & restore, benefits of minimal indexes and more details about my upcoming course discount. To get the show notes as well as get notified of new episodes, visit: https://www.scalingpostgres.com/episodes/392-100-times-faster-by-skipping/ Want…
…
continue reading
Hi, this is Allison Sheridan of the NosillaCast Apple Podcast, hosted at Podfeet.com, a technology geek podcast with an EVER so slight Apple bias. Today is Sunday, November 16, 2025, and this is show number 1071. mp3 download I’m actually out of town this week, playing with my darling grandchildren, but you know we don’t […] The post NC #1071 Eddie…
…
continue reading
1
Spies, Lies & Cybercrime--Treason from Inside The FBI
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56Question? Text our Studio direct. A young undercover FBI operative risks everything to expose America’s most devastating traitor — revealing how Cold-War spycraft evolved into today’s cybercrime economy. The shocking true story of Robert Hanssen — the FBI mole who sold America’s deepest secrets to Russia for over 20 years, leading to the execution …
…
continue reading
1
IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23Provides comprehensive instruction on IBM Watson Solutions for Machine Learning, covering various aspects of Artificial Intelligence (AI) and cognitive tools. The text is structured as a book, detailing concepts from foundational machine learning (ML) and deep learning algorithms, such as linear regression and neural networks, to practical implemen…
…
continue reading
1
Google Analytics Kickstarter Guide: Get Tips to Boost Your Traffic and Sales Using Google Analytics
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43An extensive overview of the Google Analytics platform, explaining its utility for measuring website traffic and user behavior to inform business decisions. The text details the platform's six major report categories—Realtime, Audience, Acquisition, Behavior, and Conversion—and outlines how to interpret core data components like dimensions and metr…
…
continue reading
1
722: Does a Podcaster Shit in the Woods?
1:19:42
1:19:42
Play later
Play later
Lists
Like
Liked
1:19:42The inevitable decline of civilization takes center stage as the show kicks off with the miserable results of the FACEBOOK SETTLEMENT, confirming Brian's $4.01 payout, followed by a discussion of the SPORTS BETTING SCANDAL, where MLB players are rigging games over prop bets, confirming that gambling is now actively killing sports; moving to the new…
…
continue reading
1
The Truth About AI in Everyday JavaScript Development - JSJ 696
1:15:07
1:15:07
Play later
Play later
Lists
Like
Liked
1:15:07It feels great to finally be back on the mic after a stretch of travel, work, and general chaos, and in this episode we’re diving into a topic that’s been coming up more and more in everyday developer conversations: how to actually use AI in your JavaScript development workflow. This isn’t about adding AI features to your app — it’s about using LLM…
…
continue reading
1
Cloud Native Applications with Jakarta EE: Build, Design, and Deploy Cloud-Native Applications and Microservices with Jakarta EE
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55Focuses on building, designing, and deploying cloud-native applications and microservices. The book covers foundational concepts like cloud computing basics, major cloud providers (AWS, Azure, Google Cloud), and cloud-native design principles, including the shift from monolithic to microservices architecture. Significant attention is paid to Jakart…
…
continue reading
1
The fastest agent in the race has the best evals
32:33
32:33
Play later
Play later
Lists
Like
Liked
32:33Ryan welcomes Benjamin Klieger, lead engineer at Groq, to explore the infrastructure behind AI agents, how you can turn a one-minute agent into a ten-second agent, and how they used fast inference and effective evals to build their efficient and reliable Compound agent. Episode notes: Groq delivers fast, low-cost inference using their custom-design…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading