show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Sara Chipps, Paul Ford, and Ben Popper, the series will feature questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. About Stack Overflow Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and buil ...
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
How does design impact the world around you? Discover how graphic designers, UX designers, illustrators, typographers, artists, activists and other creatives empower creativity for all. Can the design of an app, a logo, a graphic, a sound effect, or an illustration make your life better? Find out with Adobe’s Khoi Vinh, one of Fast Company’s Most Creative People in Business.
 
Learn how to get the best performance and scale your PostgreSQL database with our weekly shows. Receive the best content curated from around the web. We have a special focus on content for developers since your architecture and usage is the key to getting the most performance out of PostgreSQL.
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
Loading …
show series
 
Apache Hudi is an open-source data management framework used to simplify incremental data processing and data pipeline development. This framework more efficiently manages business requirements like data lifecycle and improves data quality. Some common use cases for Hudi is record-level insert, update, and delete, simplified file management and nea…
 
FBI warns of phishing sites using search ads Researcher finds WiFi vulnerable to “frag attacks” Data transfer demonstrated on Apple’s Find My network Thanks to our episode sponsor, Altitude Networks Imagine an employee just left and went to a competitor: did they take proprietary documents or critical roadmaps with them? Did they add a backdoor acc…
 
While the typical user of your application probably won’t be interested in your audit trails, that doesn’t mean that you can get by without them. Whether it is due to regulatory compliance issues, security policies, or simply because you need to troubleshoot something in production, you’ll have to deal with setting up and managing application audit…
 
Guest Helen Lee Bouygues of the Reboot Foundation joins Dave to talk about social media’s effect within the misinformation ecosystem and how users can best fight fake news, Dave and Joe share some follow-up from listener Jonathan on two-factor authentication, Joe's story is about an employee in Scotland sued for making payments based on phishing em…
 
What's new in Visual Studio 2022? Carl and Richard talk to Simon Calvert, Anthony Cangialosi, and Andy Sterland about the upcoming version of Studio. First on the docket is 64-bit: While Studio has been able to build 64-bit applications for more than a decade, the devenv.exe itself has remained a 32-bit application. The team discusses why it makes …
 
So another band of hackers struck again: a criminal gang known as ‘DarkSide’ unleashed a ransomware attack on the Colonial Pipeline, which shut down an integral line that supplies the East Coast with oil and gas. While the cyberattack itself didn’t physically knock out the pipeline with a string of code, the resulting attack majorly disrupted a cri…
 
It's possible we all will have a lifelong relationship with your inner critic. It begins with acceptance that its there...something that guides your actions, and possibly limits your greatness. Oddly, it's supposed to be your friend, protecting you from harm, but it doesn't understand the modern context of danger and risk, so it often overshoots th…
 
Number of industrial control systems on the internet is lower then in 2020...but still far from zero https://isc.sans.edu/forums/diary/Number+of+industrial+control+systems+on+the+internet+is+lower+then+in+2020but+still+far+from+zero/27412/ Webcast: Ransoming Critical Infrastructure https://www.sans.org/webcasts/119775 Links to FragAttacks Vendor Bu…
 
As regular listeners would know, Snake OIlers is a wholly sponsored podcast series we do here at Risky Biz HQ where vendors give us money so they can come on and pitch their products to you, our dear, dear listeners. And we have three vendors along today to pitch you: Google Cloud Security is in the top slot pitching their Zero Trust product suite …
 
Apple's brand new AirTag product got hacked already. Things you can learn from Colonial Pipeline's ransomware misfortune. Why Dell patched a bunch of driver bugs going back more than a decade. And the "Is it you in the video?" scam just keeps on coming back.Stories discussed:https://nakedsecurity.sophos.com/apple-airtag-jailbroken-alreadyhttps://na…
 
Otakar Nieder, Senior Director of Development at Bohemia Interactive Simulations, discusses how simulation apps are different from gaming and the delta needed over gaming engines to build apps for simulation. Host Kanchan Shringi spoke with Nieder about goals of a simulation versus those of a game, as well as about challenges when developing simula…
 
FireEye provides an overview of the DarkSide ransomware-as-a-service operation. Forcepoint suggests a connection between DarkSide and other ransomware gangs, notably REvil. Colonial Pipeline continues its recovery efforts from the cyber attack it sustained. As ransomware grows more common, CISA offers advice on how to prepare defenses. A new Androi…
 
An application programming interface, API for short, is the connector between 2 applications. For example, a user interface that needs user data will call an endpoint, like a special URL, with request parameters and receive the data back if the request is valid. Modern applications rely on APIs to send data back and forth to each other and save, ed…
 
It’s another Potluck! In this episode, Scott and Wes answer your questions about freelancing, climbing the corporate ladder, Throttling vs debounce, how to build skills with your free time, and more! Freshbooks - Sponsor Get a 30 day free trial of Freshbooks at freshbooks.com/syntax and put SYNTAX in the “How did you hear about us?” section. LogRoc…
 
Chris struggles with his nature, while Mike shares some sage developer advice that everyone should hear before using a platform like AWS. Then we react, strongly, to Docker charging to skip updates. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Datadog: Try Datadog free by starting a your …
 
#107: As a software development community, we're used to hearing the terms sprints, projects, and agile. However, the people that sign our paychecks, in other words, the business people, could care less and wonder why everything is taking so long and why it is so complex. Today, we speak with Steve Pereira, the found of Visible.is, a consulting fir…
 
On today's episode, I interview a personal hero of mine in the podcasting world, Katy Milkman. Katy is the host of Choiceology, a podcast about why and how we make the choices we make. Katy also just released a brand new book, How To Change - be sure to check out both of these incredible resources! Choiceology on Schwab.com How To Change on Amazon …
 
On this week’s show Patrick Gray, Adam Boileau and Chris Krebs discuss the week’s security news, including: An analysis of the Colonial pipeline ransomware attack More ransomware news UK and US expose APT29’s preferred exploits (again) IntrusionTruth drops a new post 128m Apple devices were hit by XCodeGhost Much, much more This week’s sponsor inte…
 
Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Lapor…
 
Updates on the DarkSide ransomware attack on Colonial Pipeline. Other ransomware strains, including Avaddon and Babuk are out, and dangerous. Guidelines on 5G threat vectors. Lemon Duck cryptojackers are looking for vulnerable Exchange Server instances. A bogus, malicious Chrome app is circulating by smishing. Ben Yelin examines an online facial re…
 
In the early 2000s, Nortel was consciously, intentionally, aggressively positioning itself as a partner and a friend of China. At the same time, it was China’s number one target for corporate espionage – and an early victim of its new ‘Unrestricted Warfare’ doctrine. The post China’s Unrestricted Warfare, Part 2 appeared first on Malicious Life.…
 
The Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrighted material is listed on the site, but the site doesn’t store any of the copyrighted material. It just points the user to where you can download it from. So for a while The Pirate Bay has been the largest places you can find pirated movies, music, g…
 
In today’s episode, we have the ultimate showdown between product management and developers. Meet our guest Rob O’Brien. His career started in information science technology, giving him a good grounding in app development. He has since gained extensive experience managing engineering teams as well as coaching product employees and building product …
 
The sacrifice and challenges of motherhood remains one of the best kept secrets in the world. There are stories, songs, and even holidays dedicated to the women we call 'mother,' but the truth of what they experience is hidden. In this episode, Andrew shares his own history with mothers and their impact on his life, as well as an interesting spy le…
 
Sara has been part of the open source community since 2001 and was formerly on the board of the .NET foundation. Recently she was elected to the board of the OpenJS foundation and was eager to get back in the trenches, helping people solve computer problems. In this episode we talk about coding interviews and brushing up on your puzzle solving chop…
 
Validating IP Addresses: Why Encoding Matters https://isc.sans.edu/forums/diary/Correctly+Validating+IP+Addresses+Why+encoding+matters+for+input+validation/27404/ Jail Breaking AirTags https://twitter.com/ghidraninja/status/1391148503196438529 Malicious Tor Exit Relay Activities https://nusenu.medium.com/tracking-one-year-of-malicious-tor-exit-rela…
 
The traveling salesman problem is a classic challenge of finding the shortest and most efficient route for a person to take given a list of destinations. This is one of many real-world optimization problems that companies encounter. How should they schedule product distribution, or promote product bundles, or define sales territories? The answers t…
 
Colonial Pipeline shuts down some systems after a ransomware attack, disrupting refined petroleum product delivery in the Eastern US. We’ll check in with Sergio Caltagirone from Dragos for his analysis. Other ransomware attacks hit city and Tribal governments. Joint UK-US alert on SVR tactics issued, and the SVR may have changed its methods accordi…
 
The previous episode's audio had a bit of a hiccup - this one is fixed. Sorry about that! On today's episode, I interview a personal hero of mine in the podcasting world, Katy Milkman. Katy is the host of Choiceology, a podcast about why and how we make the choices we make. Katy also just released a brand new book, How To Change - be sure to check …
 
In this episode, Dave and Jamison answer these questions: Questions This question came with a delightful ASCII-art diagram that I will now dictate as follows: “pipe space space space space” JK TLDR: I want to move up the ranks but I’m not sure what might await me… except meetings. What should I expect? And how do I get there? Too Small, Want MOAR!I…
 
In this Hasty Treat, Scott and Wes talk about technical debt — what it is, why does it occur, and some techniques for reducing and avoiding it. Prismic - Sponsor Prismic is a Headless CMS that makes it easy to build website pages as a set of components. Break pages into sections of components using React, Vue, or whatever you like. Make correspondi…
 
Oil Pipeline Ransomware, NSA OT Warning, Deepfake Uptick, Insurer Stops Ransomware Payouts, Google Automatic 2FA, AI-powered Cameras in Banks, Technology News, Content, Ideas & Analysis, Notes, Discovery, Recommendations, and the Aphorism of the Week… Support the show: https://danielmiessler.com/support/ See omnystudio.com/listener for privacy info…
 
The Black Lives Matter movement has mobilized countless people all over the world in the urgent fight for true racial justice and equality, one of the most important issues of our time. In this episode, host Khoi Vinh and producers Dominic Girard and Pippa Johnstone examine the intersection of BLM and the world of design and creativity. They unpack…
 
In this episode of Running in Production, Utsav Shah goes over buildingDropbox with Pylons, Python, Rust and Go. It’s mostly hosted on their owndata centers across 1,000+ servers. It’s been available since 2008. They have700+ million users and handle 100k+ requests per second. Utsav talks about working with hundreds of engineers on a multi-million …
 
Who is Probing the Internet for Research Purposes https://isc.sans.edu/forums/diary/Who+is+Probing+the+Internet+for+Research+Purposes/27400/ Cycle Hunter and tsuNAME DDoS Attack https://github.com/SIDN/CycleHunter https://tsuname.io/tech_report.pdf Foxit Reader / Phantom PDF Vulnerabilities https://www.foxitsoftware.com/support/security-bulletins.h…
 
LISTEN TO THE BADASS AGILE PODCAST ON SHUFFLE! - Get it here for iOS - https://getshuffle.app/ All agile failure is a failure of courage in action we're reporting back that there is an increasing rate of failure in terms of transformation and investment. the problem is not your grasp of agile, nor your tools, nor your teams we need to demonstrate c…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login