Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

A Responsive Web Design Podcast

show episodes
 
The adventures of Matt Lawrence and Mike Karan through the world of web development, web design, and small business management. As web development agency owners for the better part of a decade, they’ve worked with all sorts of technologies, through the rise of responsive web design, the revolution of serverless computing, and the popularity gain of many no-code tools for small business owners. They commonly discuss foundational web development technologies like HTML, CSS, and JavaScript - in ...
  continue reading
 
Discussing Stupid returns to the airwaves to transform digital facepalms into teachable moments—all in the time it takes to enjoy your coffee break! Sponsored by High Monkey, this podcast dives into ‘stupid’ practices across websites and Microsoft collaboration tools, among other digital realms. Our "byte-sized" bi-weekly episodes are packed with expert insights and a healthy dose of humor. Discussions focus on five key areas: Business Process & Collaboration, UX/IA, Inclusive Design, Conten ...
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Mix & Matchbox

Brent Feldman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
How do I successfully market my business online? What goes into building a custom website? Which digital tools are actually worth it? If you’ve found yourself asking any of these questions, then you’ve come to the right place! The Mix & Matchbox podcast explores innovative digital tools, dissects complicated marketing strategies, and offers pro tips on how to grow your business online. Join podcast host Brent Feldman, Cofounder of Matchbox Design Group, in interviews with members of the Matc ...
  continue reading
 
Artwork

1
The Agents of Change Digital Marketing Podcast

Rich Brooks | Interviews with Marketing Experts | SEO | Social Media Market

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Discover how to increase your online visibility, drive more qualified traffic to your site and convert that traffic into leads and business! In The Marketing Agents Podcast, we'll interview leading marketers from around the globe to get their insider tips and tricks on SEO, social media and mobile marketing. If you've been looking to reach more of your ideal customers and build your business, be sure to subscribe to The Marketing Agents Podcast today!
  continue reading
 
MAP Systems, among the leading service providers, offering premium quality services in eBook conversion, graphic designing, photo editing, prepress, virtual reality and 3d services for various entities worldwide. https://mapsystemsindia.com/
  continue reading
 
Artwork
 
Ever wondered how to make your DIY website pop, turn your online presence into a client magnet, or transform your side hustle into a full-fledged business? You're in the right place! I'm Becca, content creator for InsideTheSquare.co. I've turned my career around, transforming myself from an unknown Squarespace designer into the worlds go-to expert on all things Squarespace in just a few short years. Every Thursday, I'm dishing out actionable advice, insider tips, and game-changing strategies ...
  continue reading
 
Loading …
show series
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
In this episode of the HTML All The Things Podcast, Matt sits down with Shant Dashjian, a developer educator at Scrimba and founder of Pro Coding Mentor. Shant shares his journey from learning code to mentoring aspiring developers, highlighting the importance of building strong fundamentals, gaining real-world experience, and staying consistent whe…
  continue reading
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
  continue reading
 
In this edition of the Web News, Matt dives into a thought he had while out on the golf course: are we ever going to have tech that’s so seamless it doesn’t pull us out of the moment? We’ll talk about the current state of ‘analog’ versus ‘digital’ experiences, why even the most advanced wearables can’t fully disappear into the background yet, and w…
  continue reading
 
In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
  continue reading
 
Small budgets and Google Ads don't have to be enemies. Andy Janaitis, founder of PPC Pitbulls, has spent over a decade proving that point by helping founder-led brands and e-commerce businesses grow past seven figures without breaking the bank. His engineering background brings a refreshingly technical (but not overwhelming) approach to paid advert…
  continue reading
 
More than four out of ten (41%) Chief Information Officers (CIOs) report cybersecurity as their top concern, yet these same leaders are simultaneously increasing security budgets (77%), expanding cloud infrastructure (68%), and accelerating artificial intelligence (AI) capabilities (67%). According to the new Future Forward: CIO 2025 Outlook report…
  continue reading
 
Learning HTML is the first step to building websites, but it can feel overwhelming when you’re starting from scratch. In this crash course, Matt and Mike break down the absolute basics of HTML in a way that’s clear, practical, and beginner-friendly. You’ll learn what HTML is, how tags work, why structure matters, and how semantic HTML makes your si…
  continue reading
 
Ready to turn AI into your personal animation studio? In this episode of Mix & Matchbox, host Brent Feldman sits down with Carl Reed, CEO of Composition Media and lead instructor of the AI Animation Bootcamp at Savvy Coders. Carl shares how the animation industry has already survived two massive tech shifts—hand‑drawn ➜ digital, and now AI—and why …
  continue reading
 
In the Season 3 premiere of Discussing Stupid, Cole and Virgil kick off the new series Intentional AI: a season-long dive into how AI fits (and sometimes doesn’t even fit) into the stages of the content lifecycle. Organizations are rushing to hand entire workflows over to AI… but without a clear plan, the results are messy at best and risky at wors…
  continue reading
 
Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
  continue reading
 
How identity security can keep pace with the evolving threat landscape, with Brett Winterford Today’s threat landscape has never been more complex. Malicious actors are leveraging tools like generative AI to develop more creative social engineering attacks that can have serious ramifications for businesses. Brett Winterford, VP of Okta Threat Intel…
  continue reading
 
When beginners try to learn coding, jargon-heavy tutorials can leave them feeling confused and discouraged. In this Web News episode, Matt and Mike discuss the importance of using accessible language when writing tutorials, landing pages, and guides. Developers don’t need to explain every detail, but making your explanations approachable helps more…
  continue reading
 
As AI and cloud-based services power our connected world, individuals are facing an unprecedented privacy crisis. With more than 2.3 billion people entrusting their data to the cloud and centralized servers, cyberattacks, data breaches, surveillance, identity theft, and privacy threats are now everyday risks. How do we protect against these threats…
  continue reading
 
You're spending money on Facebook ads, and after a week, you see barely any sales coming through. Naturally, you think Facebook is a bust and pull the plug. But what if those ads were actually working—just not in the way you expected? That's exactly what happened to a Maine lobster company that almost wrote off Facebook as useless after spending $4…
  continue reading
 
In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Visit https://www.securityweekly.com/asw for all the latest episo…
  continue reading
 
In this episode of the HTML All The Things Podcast, Matt explores his new development workflow centered around spec-driven development. With AI tools and coding agents becoming more powerful, the key to success isn’t just in writing code—it’s in writing clear, detailed specs first. Matt breaks down what spec-driven development is, why it works so w…
  continue reading
 
Interview with Tod Beardsley This interview is sponsored by runZero. Legacy vulnerability management (VM) hasn't innovated alongside of attackers, and it shows. Let's talk about the state of VM. Check out https://securityweekly.com/runzero to learn more! Topic Segment: NPM Incidents In this week’s topic segment, we’re discussing all the NPM supply …
  continue reading
 
In this episode of Web News, Matt and Mike dive into two massive worm attacks that recently hit npm, targeting packages used in millions of projects. While the attackers aimed to steal crypto wallet keys, the actual damage was small—but the implications are enormous. We break down how these man-in-the-middle attacks worked, why shadow dependencies …
  continue reading
 
In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by ma…
  continue reading
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
In this episode, Matt sits down with developer and solutions architect Nathaniel Rogers to discuss the challenges of working with non-tech-savvy founders, the differences between startup, product-based, service-based, and app-based business models, and how to guide entrepreneurs through both technical and business hurdles. Nathaniel shares his expe…
  continue reading
 
In the leadership and communications segment, Lack of board access: The No. 1 factor for CISO dissatisfaction, Pressure on CISOs to stay silent about security incidents growing, The Secret to Building a High-Performing Team, and more! Jackie McGuire sits down with Chuck Randolph, SVP of Strategic Intelligence & Security at 360 Privacy, for a grippi…
  continue reading
 
After 600 episodes of interviewing digital marketing experts, I've learned a thing or two about efficiency and workflow. What started as a solo endeavor has evolved into a streamlined workflow that leverages AI, remote production teams, internal teams, and a not-so-virtual assistant—from guest vetting to social media promotion. Whether you're think…
  continue reading
 
Join host Brent Feldman with George Swetlitz, co‑founder of RightResponse AI, as they break down the hidden power of online reviews and how AI is turning reputation management from a “task” into a massive growth engine. 🔹 From George’s “central‑Europe‑post‑Berlin‑Wall” story to building a AI‑driven platform that helps 220+ audiology clinics, banks,…
  continue reading
 
This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
  continue reading
 
In this episode of the HTML All The Things Podcast, Matt and Mike explore how freelancers can handle diverse client requests with confidence. From quick initial calls and clarifying client goals to managing knowledge gaps and knowing when to outsource, they share strategies for simplifying complex requests, building trusted networks, and keeping co…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play