show episodes
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Paul Ford and Ben Popper, the series features questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. Founded in 2008, Stack Overflow is empowering the world to develop technology through collective knowledge. It’s best known for being the largest, most trusted online commun ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
d
devMode.fm

1
devMode.fm

Andrew Welch, Ryan Irelan

Unsubscribe
Unsubscribe
Monthly+
 
devMode.fm is a bi-weekly podcast dedicated to the tools, techniques, and technologies used in modern web development. We cover JavaScript frameworks like React, Vue.js, and Svelte, tooling like webpack, Docker, Nginx, Next, Nuxt, etc. and CMS systems like Craft CMS.
 
Curiouscast and Global News present the second season in the “Rising” series: China Rising is an in-depth investigation into modern China and its strained relations with the West. Hosted by Global News Senior Correspondent Jeff Semple, this ten episode season investigates allegations Beijing is applying pressure and working to infiltrate the upper echelons of power in Western countries, including Canada. The Chinese government is accused of deploying a range of tactics, from disinformation t ...
 
S
Self-Hosted

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
Loading …
show series
 
The Enneagram of Personality, or just the Enneagram, is a representation of personalities using a geometric figure, also called an enneagram (little e), to express nine interconnected personality types. While each type is unique it is related to other types through the circle connecting the type to each of it’s wings and the lines or arrows in the …
 
Luke Hoban, CTO of Pulumi, joined host Jeff Doolittle for a conversation about infrastructure as code (IAC), which allows software development teams to configure and control their cloud infrastructure assets using code in contrast to other approaches...By IEEE Computer Society
 
It’s another Potluck! In this episode, Scott and Wes answer your questions about privacy policies, coding for kids, MongaDB hosting, cloud backups, system design, #NoMoreFoo, and much more! Prismic - Sponsor Prismic is a Headless CMS that makes it easy to build website pages as a set of components. Break pages into sections of components using Reac…
 
#129: In this listener question episode, we discuss the different ways to develop microservices: fully local, fully remote and hybrid. What do you think the best way is to develop microservices? YouTube channel: https://youtube.com/devopsparadox/ Books and Courses: Catalog, Patterns, And Blueprints https://www.devopstoolkitseries.com/posts/catalog/…
 
Pick the right tool for the job. But who is picking? What tools can they choose from? And what is the actual job, anyway? This advice is important because it gives you a starting framework to answer some of the most important clarifying questions in any task of significance. 🙏 Today's Episode is Brought To you by: Compiler Compiler is a brand new p…
 
This week we’re joined by Gergely Orosz and we’re talking about the insane tech hiring market we’re in right now. Gergely was on the show a year ago talking about growing as a software engineer and his book The Tech Resume Inside Out. Now he’s laser focused on Substack with actionable advice for engineering managers and engineers, with a focus on b…
 
Welcome to another episode of the Secure Developer! During today’s conversation, Guy Podjarny, founder of Snyk, speaks with Liz Rice, Chief Open-Source Officer with eBPF pioneers Isovalent, where she works on the Cilium project, which provides cloud native networking, observability and security. They touch on plenty of current and relevant topics, …
 
In this episode of The Rabbit Hole, we unpack the recent outages of Facebook's servers, looking at why this might have happened, some of the more ludicrous theories that have been offered as explanations, lessons to take away, and why the downtime was worse than just a day of limited social media access for many people. With Facebook, Whatsapp, and…
 
Mads is a principal program manager on the Visual Studio Team and has published over 150 free Visual Studio extensions. He blogs about anything related to Visual Studio and extensibility, and is a home automation enthusiasts. Links https://twitter.com/mkristensen https://github.com/madskristensen https://www.linkedin.com/in/madskvistkristensen/ htt…
 
The last 15 years have seen the emergence of cloud-based developer APIs and services as dominant components of the developer toolchain. As a result, there has never been more power at developers’ fingertips. But making that power usable and accessible is a challenge that is shared between the providers and the consumers of these services. Google’s …
 
Today's episode is about remote work. Well, sort of. I found someone with a different perspective on remote work and a fantastic story to share, Paul Lutus. I think that he might be the original remote software developer. He left California behind for a lower cost of living in Oregon. And from Oregon, he developed software for Apple. But the kind o…
 
The gig economy involves independent contractors engaging in flexible jobs. Today gig workers often get work from centralized platforms that facilitate the process of connecting workers with employers in exchange for a fee. Some workers find the relationship between worker and platform to be adversarial in nature since the platform can establish an…
 
Russian firms see DDoS spike Sinclair hack linked to Russian organization Microsoft expires old Windows updates Thanks to our episode sponsor, Tessian and the Human Layer Security Summit Want to get the latest security insights from Cisco, Forrester, Intercontinental Exchange and Knowbe4? At Tessian’s Human Layer Security Summit you’ll get fresh in…
 
UK Correspondent Carole Theriault returns with an interview with Paul, a spam analyst, Dave and Joe have some follow-up, Joe revisits NFTs with rug pull scams, Dave's story is about phishers using a symbol in place of the Verizon logo, and our Catch of the Day comes from listener Rafael in Spain about a Steam account takeover scam attempt his son e…
 
In the past decade, NoSQL has gone from being an interesting experiment to becoming business critical. We catch up with Martin Fowler and Pramod Sadalage, co-authors of NoSQL Distilled, to understand why the database technology took off and where it’s proven its capabilities in the enterprise and how thinking around issues such as persistence model…
 
Collaboration is key - how do you add it to your applications? Carl and Richard talk to Rickard Hansson about Weavy and their API for adding audio, video, and text to your application. Rickard talks about collaboration with context - making sure you can bring together the right people at the right time to get work done. The conversation also turns …
 
Thanks to Covid 19: New Types of Documents are Lost in the Wild https://isc.sans.edu/forums/diary/Thanks+to+COVID19+New+Types+of+Documents+are+Lost+in+The+Wild/27952/ Google Chrome 95 Released https://chromestatus.com/roadmap Squirrel VM Bug https://thehackernews.com/2021/10/squirrel-engine-bug-could-let-attackers.html BlackByte Decryptor Released …
 
The LightBasin “activity cluster” has been active indeed against telecom infrastructure in what looks like an espionage campaign. The Magnitude exploit kit adds capabilities for hitting Chromium browsers. An exploit broker is interested in cloud-based VPNs. Victims continue to pay in ransomware attacks. A hacker gets seven years for conspiracy to d…
 
Why mastering your development environment can be a tricky feat, and a server outage brought to you by the late 1990s. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Datadog: Try Datadog free by starting a your 14-day trial and receive a free t-shirt once you install the agent. A Cloud Guru…
 
Venture capital investment has continued to flow into technology startups. No one builds technology from scratch. There are cloud services, software libraries, 3rd party services, and software platforms that modern entrepreneurs must adopt to build their products efficiently and quickly. These layers of infrastructure are a key area for many invest…
 
Ransomware reports signal lack of preparedness and willingness to pay Acer hacked twice in a week by the same threat actor FCC takes aim at spam texts Thanks to our episode sponsor, Tessian and the Human Layer Security Summit Worried if your security stack is enough for today’s attack landscape? A recent Forrester Consulting study says, Human Layer…
 
Can You Make the Great Chinese Firewall Work For You https://isc.sans.edu/forums/diary/Can+you+make+the+Great+Chinese+Firewall+work+for+you/27948/ Fake Government Assistance Websites https://www.ic3.gov/Media/Y2021/PSA211015 TA505 Coming Back https://www.proofpoint.com/us/blog/threat-insight/whatta-ta-ta505-ramps-activity-delivers-new-flawedgrace-v…
 
Picture of the week. Windows 11 Watch - Don't update to Windows 11 unless you need to. Patch Tuesday - PrintNightmare fix to fix the previous print nightmare fix that broke other things. Point and Print feature is the problem, not a bug. On Windows 11, installing printers might also fail when using the Internet Printing Protocol (IPP) in organizati…
 
Prolific bestselling author Troy Denning calls in on release day for Halo: Divine Wind. We discuss the book’s place in the Halo universe, his experiences collaborating with 343 Industries, and the sentimental inspiration for his first Halo story. For more with Troy, including discussion about his work on Star Wars and Dark Sun books, catch our full…
 
A look at TA505, familiar yet adaptable. A US joint cybersecurity advisory outlines the BlackMatter threat to critical infrastructure. CISA asks industry for technical information on endpoint detection and response capabilities. Is REvil trying to run on reputation? The Sinclair Broadcasting ransomware incident seems to provide a case study in rapi…
 
Fresh from his launch of the Alperovitch Institute for Cybersecurity Studies, Dmitri Alperovitch kicks off this episode with a hopeful take on the 31-nation videoconference devoted to combatting ransomware. He and Nate Jones both think a coordinated international effort could pay off. I challenge Dmitri to identify one new initiative that this grou…
 
Do you write unit tests? Do you use Test Driven Development (TDD)? Dennis Doomen does. He started an open source project called Fluent Assertions thirteen years ago that now has over 100 million downloads and has been forked over 400 times. We talk to Dennis about how Fluent Assertions got started and how it has evolved over the years. Dennis is a …
 
Whether you love them or hate them, share them or ignore them, you encounter memes all over the internet. Those that are popular can often take off and spawn a long history of remixes, variants, derivatives, and inspired works. In this episode, we interview Johan Unger, the founder of meme.com. They’re creating a platform for Meme Explorers to trac…
 
Sinclair TV disrupted by ransomware Water system proves easy target for ransomware REvil shuts down… again Thanks to our episode sponsor, Tessian and the Human Layer Security Summit Want to know what we learned from analyzing 2 million malicious emails? At Tessian’s Human Layer Summit you’ll hear about new threat intelligence into the state of spea…
 
At LinkedIn scale, it pays to save your developers a few minutes or even seconds on repeat tasks. Sara walks us through her experience managing senior engineers, and trying to improve developer experience and tooling, on a massive, global platform with over a billion user interactions a month. Paul shares some of his firm's latest work, helping to …
 
Malcious PowerShell Script Using Client Certificate Authentication https://isc.sans.edu/forums/diary/Malicious+PowerShell+Using+Client+Certificate+Authentication/27944/ PowerShell Updates https://github.com/PowerShell/Announcements/issues/27 Juniper JunOS Patches https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIES TianF…
 
This feature podcast was made possible by the Hewlett Foundation’s Cyber Initiative. The foundation has given us grant funding to produce this podcast series, which is designed to educate policymakers in cybersecurity so they can make better decisions. In this edition you’ll hear an interview I recorded with Mark Dowd. Mark is a world-renowned secu…
 
The Sinclair Broadcast Group discloses that it sustained a ransomware attack over the weekend. Twitter kicks out two North Korean catphish deployed in a cyberespionage campaign. REvil goes offline, again, perhaps this time for good. Hacking back, at least insofar as you let the hoods know you can see them. Rick Howard previews the newest season of …
 
In this episode, Dave and Jamison answer these questions: Questions I’m a technical lead and I’m planning to take the usual advice and quit my job. The catch is, I have a not-yet-vested interest in staying until the new year. My manager mentioned in passing that he’s doing resource planning for my team for next year. Should I indicate that I’ll be …
 
In May 2017, Marcus Hutchins – AKA MalwareTech – became a hero for stopping WannaCry, a particularly nasty ransomware that spread quickly all over the world. Yet his fame also brought to light his troubled past as the teenage Black Hat hacker who created KRONOS, a dangerous rootkit. Should a criminal-turned-hero be punished for his past crimes?……
 
In this Hasty Treat, Scott and Wes talk about handy utility functions with Just! Sanity - Sponsor Sanity.io is a real-time headless CMS with a fully customizable Content Studio built in React. Get a Sanity powered site up and running in minutes at sanity.io/create. Get an awesome supercharged free developer plan on sanity.io/syntax. LogRocket - Spo…
 
We talk about the recently released Svelte Summit website and a bunch of other fun stuff! Show Notes Work at Beyonk! What's new in Svelte: September What's new in Svelte: October New Svelte Summit website Design by Johan Ronsse (Wolfr_2 on Twitter) SvelteKit is awesome. CSS is awesome. Email form enhancement action DCI-P3 is just... WOW! WebKit and…
 
You are much more likely to succeed with iteration than you are with a perfect first attempt. This is purely a function of probability, and is even more supported by the idea of progressive improvement. When you can iterate, it is a better route to higher confidence of success than perfect preparation. 🙏 Today's Episode is Brought To you by: Auth0 …
 
Missouri Governor vows to prosecute St. Louis Post-Dispatch for reporting security vulnerability NFTs now come with wallet-emptying malware Experts hack a fully patched iOS 15 running on iPhone 13 at China’s Tianfu Cup hacking contest Thanks to our episode sponsor, Tessian and the Human Layer Security Summit Calling all security trailblazers! Want …
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login