IoT Emerge brings you inside information on the quickly changing world of the Industrial Internet of Things. Your hosts Bibi Jackson (Event and Marketing Director, IoT Emerge) and T.C. Doyle (Editorial Director, Channel Brands, Penton Technology) bring you insightful interviews with the people making change in the field.
…
continue reading
IoT Emerge Podcasts
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
…
continue reading
We live in a VUCA world – volatile, uncertain, complex, and ambiguous – where the only constant is change, complexity is growing, and all the ambiguity this creates is making us feel anxious and uncertain. The world is being disrupted over and over again, and the risks previously categorized as “unknown unknowns” have become commonplace. Everywhere we turn, Mount VUCA is in various stages of volcanic eruption. Join IQ4U’s Dr. Tamara Schwartz and her invited guests in this new podcast explori ...
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading
Dive into the world of cutting-edge innovations with TechToBard. Our blog explores the latest advancements in technology, from artificial intelligence and machine learning to blockchain and IoT. Stay informed about how these technologies are reshaping industries and everyday life.
…
continue reading
Dev Diner is focused on emerging tech! We've got technology opinion pieces, interviews, links and guides for developers looking to get involved in VR, AR, wearables, IoT, AI and more! The Dev Diner Podcast is where you'll find audio versions of our recorded interviews for those who prefer to listen whilst out and about (or coding up a storm).
…
continue reading
Dinis Guarda Youtube Podcast Series - Powered by citiesabc and openbusinesscouncil is a fast growing Thought leadership channel focused on profiling global leading inspiring people, leaders, CEOs, authors, technologists, academics. We highlight the ideas, products, inventions, software, books & solutions to the multiple challenges / opportunities we face in our cities / nations with the advent of Society 5.0 digital transformation 4IR AI Blockchain Fintech IoT disruptive tech Dinis Guarda is ...
…
continue reading
Is blockchain really going to change the world? Are robots taking over? How will artificial intelligence impact my business? Join host Reid Jackson as he cracks the code on emerging tech through conversations with thought leaders at the top of the digital disruption game. Titans of industry, leaders in academia, and intrepid startups will go beyond the “cool factor” of emerging technologies to discuss how and why the future of commerce depends on a global language of business. Hear about AI, ...
…
continue reading
Cavell provides strategic advice to organisations enabling the Intelligent Workplace. We deliver independent research, actionable analysis and strategic advisory services to communications providers, technology vendors and investors who are shaping the future of business communications. Cavell Cloud Conversations will bring you bitesize podcasts with some of the world's leading technology brands and most interesting speakers. Learn about the latest innovations, trends and emerging technology ...
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Your weekly celebration of JavaScript and the web. Current panelists: Jerod Santo, Kevin Ball (KBall), Nick Nisi, Chris Hiller, Amal Hussein & Amy Dutton. Past panelists: Suz Hinton, Feross Aboukhadijeh, Amelia Wattenberger, Divya Sasidharan, Alex Sexton, Rachel White, Emma Bostian, Ali Spittel, Mikeal Rogers & Jessica Sachs. We talk about the web platform (Chrome, Safari, Edge, Firefox, Brave, etc), front-end frameworks (ReactJS, SolidJS, Svelte, VueJS, AngularJS, etc), JavaScript and TypeS ...
…
continue reading
The public transport industry is undergoing rapid change, from decarbonisation and sustainability goals to the fast-paced evolution of digital technology. Mobility Redefined is the podcast for senior managers, executives, and decision-makers who are leading this transformation. Hosted by Dr Kaan Yildizgöz, Executive Director at Modaxo, each episode brings expert insights on the challenges and opportunities facing the transport sector today. From digitalisation and workforce development to cu ...
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
The Data Diva Talks Privacy Podcast The Debbie Reynolds “The Data Diva” Talks Privacy Podcast features thought-provoking discussions with global leaders on the most pressing data privacy challenges facing businesses today. Each episode explores emerging technologies, international laws and regulations, data ethics, individual rights, and the future of privacy in a rapidly evolving digital world. With listeners in more than 130 countries and 2,900 cities, the podcast delivers valuable insight ...
…
continue reading
The UPSTACK Podcast is an ever-evolving conversation on all things digital infrastructure, giving CTOs, CIOs, CISOs and other tech leaders "food for thought” as they push to stay ahead of the technology curve. Greg Moss, UPSTACK’s Partner and Managing Director, invites guests to talk candidly about the latest technology infrastructure topics. Co-hosted by SVP of Marketing, Alex Cole, this is sure to be a podcast worth listening to.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading

1
Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies)
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36Explores the integration of Cloud Computing and the Internet of Things (IoT), highlighting their combined applications across diverse sectors. It details the fundamental concepts of both cloud computing and IoT, including their architectures, components, advantages, and disadvantages. The source also examines real-world applications such as smart c…
…
continue reading

1
Malware Analysis Using Artificial Intelligence and Deep Learning
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading

1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading

1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading

1
Driving Disrupted! Autonomous Vehicles Take to the Streets
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50The future of driving may not involve any driving at all. From highway autopilot to fully autonomous taxis, self-driving cars promise to revolutionize how we move through the world. But behind the sleek dashboards and lidar sensors are complex ethical questions, safety concerns, and infrastructure challenges that society is only beginning to confro…
…
continue reading
By CyberSecurity Summary
…
continue reading

1
HW062: Designing Access Points For the Enterprise
25:18
25:18
Play later
Play later
Lists
Like
Liked
25:18By Packet Pushers
…
continue reading
By CyberSecurity Summary
…
continue reading

1
The Data Diva E257 - Gina King and Debbie Reynolds
44:51
44:51
Play later
Play later
Lists
Like
Liked
44:51
…
continue reading

1
Pioneering African Public Transport: A Conversation with Edwins Mukabanah of Kenya Bus Service
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29
…
continue reading

1
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
…
continue reading

1
ITIL 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Serves as a comprehensive guide for IT professionals, offering both theoretical knowledge and practical application of ITIL 4 service management principles. It covers key concepts, roles, the four dimensions of service management, the Service Value System (SVS), guiding principles, governance, the service value chain, and various ITIL practices. Th…
…
continue reading

1
ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Provides comprehensive guidance on implementing the ISO/IEC 27001:2013 standard for information security management systems (ISMS). The text details requirements for risk assessment, risk treatment, and the creation of a Statement of Applicability (SOA), offering practical methodologies like the event-consequence approach and various control types.…
…
continue reading

1
Introduction to Python Network Automation: The First Journey
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48Provides a detailed guide for network engineers to transition into network automation. It commences with fundamental Python concepts, covering data types, syntax, and error handling through numerous exercises. The book then progresses to Linux administration essentials, emphasizing the creation and management of virtual environments using VMware Wo…
…
continue reading

1
Intelligent Reliability Analysis Using MATLAB and AI: Perform Failure Analysis and Reliability Engineering using MATLAB and Artificial Intel
15:04
15:04
Play later
Play later
Lists
Like
Liked
15:04Introduces intelligent reliability analysis using MATLAB and AI, focusing on failure analysis and reliability engineering. It covers foundational concepts like reliability fundamentals, measures of reliability such as MTBF and MTTF, and remaining useful lifetime (RUL) estimation techniques. The sources also explore experimental methodologies like a…
…
continue reading

1
Sunjeh Raja - Director & CEO - International Centre for Culinary Arts (ICCA Dubai), Foodverse
55:27
55:27
Play later
Play later
Lists
Like
Liked
55:27Sunjeh Raja is the Director & CEO of the International Centre for Culinary Arts (ICCA Dubai), an international award-winning and world-class culinary training centre established in 2005. ICCA Dubai with 12,000+ Students, 20+ Countries, Countless Inspiring Stories is renowned for its high standards in culinary education, offering globally recognised…
…
continue reading

1
Implementing VMware Dynamic Environment Manager:: Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies
19:41
19:41
Play later
Play later
Lists
Like
Liked
19:41A comprehensive guide to VMware Dynamic Environment Manager (DEM), a solution for managing end-user desktop experiences. It details the installation and initial configuration of DEM, including setting up Group Policy Objects (GPOs) and understanding the NoAD mode. The text explores various aspects of desktop management, such as user personalization…
…
continue reading

1
OpenAI API Cookbook: Build intelligent applications including chatbots, virtual assistants, and content generators
18:31
18:31
Play later
Play later
Lists
Like
Liked
18:31A practical guide for building intelligent applications using the OpenAI API. The book provides step-by-step instructions on leveraging various OpenAI endpoints, including Chat Completions, Images, and Audio, to create diverse applications like chatbots, virtual assistants, and content generators. It explains how to interact with the API through to…
…
continue reading

1
NoOps: How AI Agents Are Reinventing DevOps and Software
19:50
19:50
Play later
Play later
Lists
Like
Liked
19:50Explores the evolution of DevOps and its contemporary challenges, particularly the issue of fragmented toolchains and the necessity of standardization. It details how cloud-native and data-centric architectures, including microservices, containers, and Infrastructure as Code (IaC), establish a robust foundation for modern software delivery. A signi…
…
continue reading

1
The Data Diva E256 - Jennifer Wondracek and Debbie Reynolds
37:27
37:27
Play later
Play later
Lists
Like
Liked
37:27Send us a text Episode 256 – Jennifer Wondracek, Director of the Law Library and Professor of Legal Research and Writing, Capital University Law School, ABA Women of Legal Tech Honoree What happens when courts rely on fake cases created by AI? Jennifer Wondracek examines the risks associated with AI in legal research and education. On The Data Diva…
…
continue reading

1
Mastering spaCy: Build structured NLP solutions with custom components and models powered by spacy-llm
37:46
37:46
Play later
Play later
Lists
Like
Liked
37:46A comprehensive guide for Natural Language Processing (NLP) professionals, focusing on advanced techniques and applications using the spaCy library. The text covers various topics, including linguistic feature extraction, rule-based matching, utilizing transformer models like BERT and RoBERTa within spaCy, and integrating Large Language Models (LLM…
…
continue reading

1
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12A comprehensive guide for network professionals transitioning from traditional Multiprotocol Label Switching (MPLS) to Segment Routing MPLS (SR-MPLS). It aims to simplify this complex shift through theoretical explanations and practical lab exercises, using network emulators like EVE-NG and virtual Cisco XRv9k routers. The text explores fundamental…
…
continue reading

1
Ruby Way, The: Solutions and Techniques in Ruby Programming (Addison-Wesley Professional Ruby Series)
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58A reference for Ruby programming. It covers a vast array of topics, beginning with fundamental data types like strings and numbers, and progressing through complex data structures such as arrays, hashes, and trees. The material also explores object-oriented programming (OOP) principles, file I/O and data storage methods, graphical user interface (G…
…
continue reading

1
Mastering C++ Game Animation Programming: Enhance your skills with advanced game animation techniques in C++, OpenGL
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide to developing sophisticated 3D game character animations and virtual worlds. The content covers a wide array of topics, starting with fundamental concepts like loading models and basic animations and progressing to advanced techniques such as GPU-accelerated calculations using compute shaders. Readers will learn about implemen…
…
continue reading

1
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
21:18
21:18
Play later
Play later
Lists
Like
Liked
21:18A powerful technology for programming the Linux kernel to enhance observability, networking, and security. It explains eBPF's fundamentals, including its virtual machine, instruction set, maps, and helper functions, along with the verifier that ensures program safety. The text details how eBPF programs are written in C (and increasingly Rust), comp…
…
continue reading

1
Machine Learning for Tabular Data: XGBoost, Deep Learning, and AI
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09Focuses on machine learning for tabular data, covering its fundamental concepts and practical applications. The sources explore various machine learning and deep learning approaches, with a particular emphasis on gradient boosting techniques like XGBoost and LightGBM, highlighting their efficacy with structured data. Readers will learn about data p…
…
continue reading

1
Learning LangChain: Building AI and LLM Applications with LangChain and LangGraph
46:25
46:25
Play later
Play later
Lists
Like
Liked
46:25A comprehensive guide for developers creating AI and Large Language Model (LLM) applications. The book covers fundamental concepts such as prompt engineering and retrieval-augmented generation (RAG), explaining how to integrate external data and manage conversational memory. It thoroughly explores various cognitive architectures like chains, router…
…
continue reading

1
Learn Quantum Computing with Python and IBM Quantum: Write your own practical quantum programs with Python
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42A comprehensive guide for individuals seeking to understand and implement quantum programs using Python and the IBM Quantum platform. It explores fundamental quantum computing principles like superposition, entanglement, and interference, detailing how these concepts underpin the creation of quantum circuits. The text also provides practical instru…
…
continue reading
A comprehensive guide for mastering shader programming within the Unity 5 game engine. Authored by Alan Zucconi and Kenneth Lammers, it explores various lighting models, rendering techniques, and visual effects, ranging from basic diffuse shading and texture mapping to advanced concepts like Physically Based Rendering (PBR) and screen effects. The …
…
continue reading

1
Aanshul Bafnaa - Founder - The ModMonk Consultancy
1:36:51
1:36:51
Play later
Play later
Lists
Like
Liked
1:36:51Aanshul Bafnaa, also known as "ModMonk” or “Modern Monk” is the founder of ModMonk and CEO of the ModMonk Consultancy. With over 17 years of experience, she is a business psychologist, spiritual coach, professor, mystic, hypnotherapist, mindfulness coach, healer, and yoga expert, Aanshul provides corporate training in areas such as mythology, leade…
…
continue reading

1
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05A practical resource for mastering cybersecurity assessments. The text covers Nmap's versatile applications in network security, including penetration testing, red teaming, and purple teaming, detailing fundamental and advanced scanning techniques. It emphasizes setting up a lab environment for hands-on practice, mapping attack surfaces, identifyin…
…
continue reading

1
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30Discuss Radio Frequency Identification (RFID) technology, exploring its evolution and applications across various industries, particularly supply chain management and retail. They examine the technical advancements in RFID, including printed electronics and silicon ink, highlighting their impact on cost reduction and performance. A significant port…
…
continue reading

1
HW061: Cisco’s Ultra-Reliable Wireless Backhaul
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36As automation of machinery in industrial environments grows, there is a need for reliable wireless technologies to connect and control mobile assets. Mobile assets cannot tolerate dropped connections or network latency, which could jeopardize safety among other problems. Cisco’s Ultra-Reliable Wireless Backhaul is one such product that promises to …
…
continue reading

1
The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44Offers an in-depth look at security concerns surrounding Large Language Models (LLMs), drawing heavily from "The Developer’s Playbook for Large Language Model Security" by Steve Wilson. It presents endorsements highlighting the book's importance for AI developers and security professionals due to the novel risks LLMs introduce. The text outlines va…
…
continue reading

1
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY (Bitcoins, Hacking, Kali Linux)
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12Provides an extensive overview of operational security (opsec) and anonymity in the digital and physical realms. It thoroughly explains the use of tools like Tor, Freenet, and various encryption methods (PGP, Truecrypt, Veracrypt) to protect digital footprints, communications, and data. The text also highlights the importance of physical security p…
…
continue reading

1
The Data Diva E255 - Don Morron and Debbie Reynolds
40:21
40:21
Play later
Play later
Lists
Like
Liked
40:21Send us a text Episode 255 – Don Morron, Founder and CEO of Highland Tech, AI Agents for Enterprise What does it take to build resilience in a world of constant cyber threats? Don Morron shares strategies for adapting without losing control. On The Data Diva Talks Privacy Podcast, Debbie Reynolds, “The Data Diva,” interviews Don Morron, Founder and…
…
continue reading

1
Speed Up Your Python with Rust: Optimize Python performance by creating Python pip modules in Rust with PyO3
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05A technical guide published by Packt Publishing in 2021. It focuses on optimizing Python application performance by integrating Rust code. The book provides practical guidance on creating Python pip modules with Rust, managing dependencies using Cargo, and structuring Rust code for efficient integration. It explores advanced topics like concurrency…
…
continue reading

1
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
27:04
27:04
Play later
Play later
Lists
Like
Liked
27:04A comprehensive overview of ransomware. It details the history and evolution of various malware types, with a specific focus on ransomware families like Ryuk, WannaCry, and Locky. The sources explore the methods of ransomware distribution, such as email phishing and exploit kits, and explain why traditional antivirus software struggles to detect th…
…
continue reading
A comprehensive overview of networking fundamentals. It covers essential network concepts, including devices, applications, protocols, and services, explaining their roles within the OSI model and discussing routing and switching characteristics. The text further explores IP addressing components, network topologies, and wireless technologies, alon…
…
continue reading

1
Microsoft Exam MD-100 Windows 10 Certification Guide: Learn the skills required to become a Microsoft Certified Modern Desktop Administrator
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59Provides comprehensive information on deploying, upgrading, customizing, and configuring the Windows 10 operating system. It covers essential topics such as managing local users, groups, and devices, configuring permissions and file access, implementing local policies, and securing data and applications. The text also explores network configuration…
…
continue reading

1
Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15A comprehensive guide to securing cloud-native applications and APIs, specifically focusing on OAuth and OpenID Connect standards. The book covers a wide range of topics, including API authorization, token design and management, secure client implementations for various application types (web, mobile, desktop), and the deployment and operational as…
…
continue reading

1
Azure OpenAI Essentials: A practical guide to unlocking generative AI-powered innovation with Azure OpenAI
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11A comprehensive guide to leveraging Azure OpenAI. It details the fundamentals of Large Language Models (LLMs), their various applications, and how to integrate them within the Microsoft Azure ecosystem. The book explores advanced topics such as multimodal capabilities, function calling, and Assistants API, along with crucial aspects of privacy, sec…
…
continue reading

1
Cisco ThousandEyes: Digital Experience Monitoring and Troubleshooting (Networking Technology)
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25A comprehensive guide for IT professionals on utilizing the Cisco ThousandEyes platform. The book covers deploying and configuring various ThousandEyes agents like Enterprise, Cloud, and Endpoint agents, and details different test types for network, DNS, and web layers, including sophisticated Transaction tests. It also explores alerting mechanisms…
…
continue reading

1
CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 (Sybex Study Guide)
19:24
19:24
Play later
Play later
Lists
Like
Liked
19:24A comprehensive guide to CompTIA A+ certification, focusing on hardware, networking, operating systems, and security. It details various display technologies like LCD, IPS, and OLED, along with connectivity standards such as USB-C and Thunderbolt. The text also covers printer types, maintenance, and common troubleshooting steps for issues ranging f…
…
continue reading

1
Certified Kubernetes Administrator Study Companion : Preparing for the Linux Foundation's CKA Exam
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35A study companion for the Certified Kubernetes Administrator (CKA) exam, offering comprehensive guidance for professionals aiming to master Kubernetes. It covers fundamental concepts, architecture, and installation using tools like KinD and Kubeadm, progressing to advanced topics such as workloads, scheduling, storage, networking, and security. The…
…
continue reading

1
Exploring Azure Container Apps: Scaling Modern and Cloud-Native Apps and Microservices
19:43
19:43
Play later
Play later
Lists
Like
Liked
19:43A comprehensive guide for developers by Naga Santhosh Reddy Vootukuri, Taiseer Joudeh, and Wael Kdouh, with technical review by Tommaso Stocchi. It details the Azure Container Apps (ACA) platform, comparing it to other Azure services like App Services and Kubernetes Service (AKS), and covers deploying containerized applications. The text also expla…
…
continue reading

1
Cybersecurity Disrupted! How Videogames are reshaping cybersecurity threats
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26What if the next cybersecurity breach didn’t start in a server room—but in a game lobby? As video games become more immersive, social, and connected, they're also becoming prime battlegrounds for digital threats. On this episode of WMD Dr. Tamara Schwartz welcomes YCP Business Analytics graduate Kaitie Ciano and Cybersecurity Management graduate Za…
…
continue reading

1
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
28:29
28:29
Play later
Play later
Lists
Like
Liked
28:29An ethical hacker's guide to the unique challenges of analyzing, compromising, mitigating, and securing industrial processes. It offers a practical, hands-on approach to understanding and exploiting vulnerabilities in industrial control systems (ICS) and operational technology (OT) environments. The text covers setting up a virtual lab, open-source…
…
continue reading

1
Azure for Developers: The definitive guide to creating secure, scalable Azure apps with GenAI, serverless, and DevOps pipelines
20:32
20:32
Play later
Play later
Lists
Like
Liked
20:32A comprehensive guide for creating secure and scalable applications on Microsoft Azure. It covers a wide array of topics crucial for modern development, including integrating Generative AI, leveraging serverless architectures, and implementing robust DevOps pipelines. The book instructs readers on setting up their development environment, managing …
…
continue reading