Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Software Defined Talk Podcasts

show episodes
 
Artwork

1
Software Defined Talk

Software Defined Talk LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork
 
From autonomous robots to advancements in healthcare, edge AI and computer vision are driving innovations across every market vertical. On “insight.tech Talk,” we chat with industry thought leaders about the impact of the latest technologies, such as Gen AI, software-defined everything, and 5G. Join the conversation with #InsightDotTechTalk.
  continue reading
 
Artwork

1
Crucible Moments

Sequoia Capital

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the inflection points that shaped some of the most significant companies of our time. Crucible moments are pivotal decisions that determine your trajectory. In Season 2, hear from founders and leaders like Steve Chen of YouTube, Drew Houston of Dropbox, Frank Slootman of ServiceNow and Tony Xu of DoorDash, Steve Huffman of Reddit and more about how they navigated the challenges and opportunities that defined their stories. Hosted by Roelof Botha of Sequoia Capital. The conten ...
  continue reading
 
Artwork

1
Inside Electronics

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Electronic Design has been serving the engineering community with pride for decades, providing news, commentary, and interviews about the industry. Hosted by industry veteran Alix Paultre, the Inside Electronics podcast brings you commentary, news, and interviews about the things going on in the electronic design engineering community and its surrounding business ecosystem.
  continue reading
 
If Between Two Ferns and C-SPAN had a child, it would be All Quiet on the Second Front. Blending the very best (and the worst) of government gravitas with technical expertise, Second Front’s Chief Executive Officer, Tyler Sweatt, cuts through the noise and the bureaucratic BS surrounding all things defense tech, national security, and government markets. Be warned: this is not your typical military or government podcast. As host, Tyler has an uncanny ability to get people to talk honestly, m ...
  continue reading
 
Artwork
 
Welcome to “A mile in a CTO's shoes” the podcast for non-technical founders, who want to understand how to deal with software developers. We talk about productivity, entrepreneurship, Tech ,webmarketing & lifestyle.
  continue reading
 
Welcome to Our Connected World, a podcast series from TE Connectivity, featuring straight talk for engineers about today’s technology trends and the technical challenges in driving innovations crucial to making the world safer, sustainable, productive, and connected.
  continue reading
 
Artwork
 
Talking the Drive reimagines experiences for drivers and passengers that are smarter than radio and navigation systems, and simpler than apps and other infotainment solutions. Drawing on his unique background from building Disney theme parks to revolutionizing GPS navigation to delivering personalized audio news and podcasts, host John MacLeod invites his guests to reimagine what’s next. By connecting the dots among streaming audio, podcasts, voice technologies, navigation, AI, and self-driv ...
  continue reading
 
Loading …
show series
 
This week, we try a shorter format inspired by the Dithering podcast. The conversation digs into the difference between apps built with AI from the ground up and those with AI bolted on after the fact. Watch the YouTube Live Recording of Episode 525 Rundown Format inspired by Dithering An Interview with Cursor Co-Founder and CEO Michael Truell SDT …
  continue reading
 
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The convers…
  continue reading
 
In this episode, Whitney and Coté discuss with Betty Junod, CMO of Heroku, the evolution of growing up without the internet to the present day's AI advancements and its implications for future generations. They explore how AI is changing critical thinking and curiosity, and how it affects children and business use cases. They also delve into workpl…
  continue reading
 
In this episode of Security Weekly News, Doug White discusses various cybersecurity threats, including the Salt Typhoon and Spark Kitty malware, the implications of Microsoft's decision to drop support for old hardware drivers, and the potential increase in cyber threats from Iran. The conversation also covers the alarming 16 billion password leak …
  continue reading
 
Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
  continue reading
 
Not every microcontroller can handle artificial intelligence and machine learning (AI/ML) chores. Simplifying the models is one way to squeeze algorithms into a more compact embedded compute engine. Another way is to pair it with an AI accelerator like Femtosense’s Sparse Processing Unit (SPU) SPU-001 and take advantage of sparsity in AI/ML models.…
  continue reading
 
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
  continue reading
 
Jerod tells Adam about bad he hates the taste of Gin, sips on some Generative A Rye (on the rocks), they open the comments section for a bit, and land the plane talking about being alone, naked, and afraid. Join the discussion Changelog++ members save 6 minutes on this episode because they made the ads disappear. Join today! Sponsors: Retool – Asse…
  continue reading
 
This week, we cover Apple’s WWDC updates—from containerization to Foundation Models—and the Linux Foundation’s new FAIR Package Manager. Plus, we crown the best SDT Uber rider. Watch the YouTube Live Recording of Episode 524 Runner-up Titles Infinite Workday. No more Eudora Revealed productivity. I threw up a tarp over my desk. We agreed to not tal…
  continue reading
 
This week: * The true details around Salt Typhoon are still unknown * The search for a portable pen testing device * Directories named "hacker2" are suspicious * Can a $24 cable compete with a $180 cable? * Hacking Tesla wall chargers * Old Zyxel exploits are new again * Hacking Asus drivers * Stealing KIAs - but not like you may think * Fake artic…
  continue reading
 
Jerod is joined by Carson Gross, the creator of htmx –a small, zero-dependency JavaScript library that he says, “completes HTML as a hypertext”. Carson built it because he’s big on hypermedia, he even wrote a book called Hypermedia Systems. Carson has a lot of strong opinions weakly held that we dive into in this conversation. Join the discussion C…
  continue reading
 
Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
  continue reading
 
On this episode of All Quiet on the Second Front, Tyler sits down with longtime friend and fellow West Point grad Rob Boeckmann, now Director of Social at Black Rifle Coffee Company, to talk about his unconventional path from field artillery officer to global brand strategist. They dig into the real-world parallels between military ops and modern m…
  continue reading
 
What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
  continue reading
 
As navigation becomes increasingly vulnerable to jamming, spoofing, or complete denial, military forces operating in contested environments face significant challenges, not just in navigation, but in coordination, safety, and mission success. ANELLO Photonics has developed an innovative Silicon Photonics Optical Gyroscope (SiPhOG) to serve autonomo…
  continue reading
 
Lukas Mathis tells us to stop uploading our data to Google, Robert Vitonsky wants web devs to not guess his language using his IP, Tom from GameTorch reminds us that software talent is gold right now, Austin Parker from Honeycomb describes how LLMs are upending the observability industry, and Vitess co-creator, Sugu Sougoumarane, joins Supabase to …
  continue reading
 
Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
  continue reading
 
Justin Searls joins Jerod in Apple’s WWDC wake for hot takes about frosty UIs. We go (almost) point-by-point through the keynote, dissecting and reacting along the way. Concentricity! Join the discussion Changelog++ members save 5 minutes on this episode because they made the ads disappear. Join today! Sponsors: Retool – Assemble your elite AI team…
  continue reading
 
Brandon talks with Sterling Chin, Senior Developer Advocate at Postman, about building great APIs, why AI needs APIs, and what’s new at Postman. Plus, hear how he made the leap from 3rd-grade teacher to dev advocate. Watch the YouTube Live Recording of Episode 523 Episode Links Postman POST/CON Keynote Recap Postman Agent Mode Postman API Network P…
  continue reading
 
What does it really take to succeed in today’s fast-paced, innovation-driven world? In this episode of Hanselminutes, Scott Hanselman chats with Earl Valencia—acclaimed tech leader, venture-backed founder, and author of Startup Mindsets: A Blueprint to Thrive in an Innovation-Driven and Globally Connected World. Earl brings real-world insights from…
  continue reading
 
This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
  continue reading
 
In this episode, Whitney and Coté discuss Whitney's newfound enthusiasm for AI after a recent stint with the tool Cursor. The conversation covers how AI tools can aid in coding, building engineering journals, and even drafting compelling conference talk abstracts. They highlight the difference between tasks and prompts in AI, personalizing AI inter…
  continue reading
 
Jerod chats with Richard Feldman about Roc – his fast, friendly, functional language inspired by Richard’s love of Elm. Roc takes many of Elm’s ideas beyond the frontend and introduces some great ideas of its own. Get ready to learn about static dispatch, platforms vs applications, opportunistic mutation, purity inference, and a whole lot more. Joi…
  continue reading
 
This week, it’s time for security money. The index is up, but the previous quarterly results were brutal. In the leadership and communications segment, Get out of the audit committee: Why CISOs need dedicated board time, Quietly Burning Out? What To Do When Your Leadership Starts Lacking, How to rethink leadership to energize disengaged employees, …
  continue reading
 
CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
  continue reading
 
In this episode, we talk to Jerry Twomey, an engineering consultant with a deep background in electronics design, medical devices, electro-mechanical systems, and board-level integrated circuits. He is the author of the book “Applied Embedded Electronics – Design Essentials for Robust Systems," a comprehensive reference that covers the design proce…
  continue reading
 
Diwank explains why you should never let AI writes your tests, Apple redesigns all of their software platforms, AI has brought about the rise of judgement over technical skills, Peter Steinberger says Claude Code is now his computer, and the curious case of Memvid. View the newsletter Join the discussion Changelog++ members support our work, get cl…
  continue reading
 
Segment 1 - Enterprise Security News, Live at IDV This week, in the enterprise security news, Acquisitions potential IPOs Terminator Salvation in real life First $1B one-employee business? Mikko puts in his notice Pitch Black in real life, and more! Segment 2 - Interview with Dr. Tina Srivastava The #1 cause of data breaches is stolen credentials. …
  continue reading
 
The ever-provocative Steve Yegge joins us fresh off a vibe coding bender so productive, he wrote a book on the topic alongside award-winning author Gene Kim. Steve tells us why he believes the IDE is dead, why babysitting AI agents is more fun than coding, when vibe coding might take over the enterprise, how software devs should approach coding age…
  continue reading
 
This week, we discuss Apple reversioning macOS, the steady state of private cloud, and Snowflake’s acquisition of CrunchyData. Plus, the eternal quest for a 5-star Uber rating. Watch the YouTube Live Recording of Episode 522 Runner-up Titles Saudi crypto money You know what humans like? Buses I think we need 10 stars Snow lion Maslow’s hierarchy of…
  continue reading
 
Two parts to this episode: Tech Segment: Updating Linux Systems - Beyond apt-get upgrade * Custom scripts for ensuring your Linux systems are up-to-date * topgrade - tutorial for using topgrade to update Linux systems on various Linux distributions Discussion Topic: Anti-Malware and/or EDR on Linux Platforms * PCI calls for scanning Linux systems *…
  continue reading
 
Ever wonder how AI “sees” high-dimensional data? In this special 1,000th episode of Hanselminutes, Scott Hanselman chats with AI expert Pamela Fox about the fascinating world of visualizing complex data. Pamela breaks down how those abstract numbers and vectors can be turned into visuals we can actually understand—basically helping us see how AI th…
  continue reading
 
We’re on location at Microsoft Build 2025 with Amanda Silver, Corporate Vice President of Microsoft’s Developer Division. Amanda leads product, design, user research, and engineering systems for some of the tools you use every day. We discuss the latest AI announcements from Microsoft at Build 2025, how AI is reshaping development tools, what’s nex…
  continue reading
 
During times of volatility, business leaders often don’t know what they are able to change or even what they should change. At precisely these times, business leaders become risk leaders and need to quickly learn how to identify what is within their control and what isn’t — to not only survive but thrive. Alla Valente, Principal Analyst at Forreste…
  continue reading
 
In this special episode of All Quiet on the Second Front, we’re bringing you a live recording from Offset 2025. Moderated by Danielle Metz, 2F Chief Policy Officer, this panel tackles a question that’s easy to say but hard to operationalize: how do we actually build trust between government and industry to deliver secure, mission-ready technology? …
  continue reading
 
The recent popularity of MCPs is surpassed only by the recent examples deficiencies of their secure design. The most obvious challenge is how MCPs, and many more general LLM use cases, have erased two decades of security principles behind separating code and data. We take a look at how developers are using LLMs to generate code and continue our sea…
  continue reading
 
Mike Engelhardt is an American computer programmer, author, and entrepreneur who is renowned for developing the SPICE-based analog electronic circuit simulator computer software. Known for his wide-brimmed hat and bow tie, Mike is the innovative mind behind Qorvo’s simulator, QSPICE, and is not just known for his technical acumen, but also for his …
  continue reading
 
We’re doing a live show in Denver this July, Danilo Alonso has seen the ‘developer replacement’ hype cycle many times, Dan Sinker says we’re in the Who Cares Era, Cap looks like a solid alternative to typical CAPTCHA solutions, Michael Flarup on the return of texture, depth, and expressiveness in UI & Kan is an open source alternative to Trello. Vi…
  continue reading
 
Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what’s keeping IT decision-makers awkward at night, and the best approach to creatin…
  continue reading
 
We bring you back to Microsoft Build 2025 to nerd out with Craig Loewen on Windows Subsystem for Linux and Mads Torgersen on leading the design of C#. Join the discussion Changelog++ members get a bonus 7 minutes at the end of this episode and zero ads. Join today! Sponsors: Heroku – The Next Generation of Heroku “Fir” is coming soon — Fir is built…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play