show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
How does design impact the world around you? Discover how graphic designers, UX designers, illustrators, typographers, artists, activists and other creatives empower creativity for all. Can the design of an app, a logo, a graphic, a sound effect, or an illustration make your life better? Find out with Adobe’s Khoi Vinh, one of Fast Company’s Most Creative People in Business.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Sara Chipps, Paul Ford, and Ben Popper, the series will feature questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. About Stack Overflow Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and buil ...
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
Loading …
show series
 
Uber is one of many examples we’ve discussed on this show that has changed the world with big data analysis. With over 8 million users, 1 billion Uber trips and people driving for Uber in over 400 cities and 66 countries, Uber has redefined an entire industry in a very short time frame. It’s difficult to find precise details about Uber’s big data i…
 
Trisha Gee and Kevlin Henney of 97 Things Every Java Developer Should Know discuss their book, which is a collection of essays by different developers. Host Felienne spoke with Gee and Henney about Java, including how to use immutability in Java, the value of type inference, and how to use your IDE most effectively when […]…
 
Perl is the Application Director for Unqork's professional services organization. In that role she works closely with clients to help prototype and develop their applications. You can read more about the software Unqork helped New York City create to deliver food during the pandemic here. Beach is a community manager at Unqork and has written a gre…
 
On this episode we’re talking with our good friend Mat Ryer whom you may know from the Go Time podcast. Mat created an awesome open source tool for putting just about anything in your Mac’s toolbar. It was originally written in Objective-C, but it just got a big rewrite in Go and abig rename from BitBar to xbar. If you don’t use a Mac don’t hit ski…
 
Today's episode reports on a fake Darkside group sending threatening emails, how Google hopes to stop software supply chain attacks, another Carnival cruise line hack and the lastest vishing scams
 
This week we discuss Salesforce becoming Slack-first and a16z launching a media site. Plus, some thoughts on how to use Twitter. Rundown SFDC Salesforce CEO: We're going to rebuild all of our technology to become Slack-first Salesforce Targets ServiceNow: Slack Delivers “Human Workflow” Andreessen Horowitz goes into publishing with Future Relevant …
 
#111: Ever since Alex Birsan published his Dependency Confusion article in February 2021, the concept of the software supply chain has come to the forefront. The supply chain should not be a new concept to people, but many seemed to have been caught off guard. Today we talk about Alex's article along with a new project that allows you to manage you…
 
This week, in our first segment, we welcome Doni Brass, Product Management Lead at Cisco Umbrella, to discuss How Criminals Use Cloud Apps to Inject Chaos into Work Environments! In the second segment, Brendon Macaraeg, Senior Director of Product Marketing at Fastly, joins to talk tell us How Teams Can Reduce the Visibility Gap! In the Enterprise N…
 
In The Five Forces That Change Everything, Steve Hoffman, venture capitalist and CEO of Founders Space, takes you on a journey to see what the most brilliant minds of our age are dreaming up. Hoffman reveals how new scientific breakthroughs and business ventures are poised to reshape our lives and turn science fiction into fact. The Five Forces Tha…
 
The ChaChi Trojan is out, about, and interested in educational institutions. Bogus free subscription cancellations figure in a social engineering campaign designed to get the victims to download BazarLoader. Ursnif is automating fraudulent bank transfers with Cerberus Android malware. The US Senate invites the Department of Defense to think of rans…
 
S3 Ep38: Clop busts, destructive Linux hacking, and rooted bicyclesUkrainian cops bring out the BFG (Big Fearsome Grinder) and cut open some doors. A repeated request for destructive Linux code enters its 15th year. Peloton exercise bicycles found to be rootable.https://nakedsecurity.sophos.com/clop-ransomware-suspects-busted-in-ukrainehttps://nake…
 
Imagine you’re at work, it’s a long day and you lean back in your chair only to hear a chime and a disembodied voice.The voice fills the room and it tells you to stop leaning and get back to work. There’s a sense that someone is always watching and ready to reprimand you for the slightest infraction. That’s the promise of Live Eye—a CCTV camera sys…
 
Uber is one of many examples we’ve discussed on this show that has changed the world with big data analysis. With over 8 million users, 1 billion Uber trips and people driving for Uber in over 400 cities and 66 countries, Uber has redefined an entire industry in a very short time frame. It’s difficult to find precise details about Uber’s big data i…
 
Join Dr. Casey Marks for a two-part discussion of the merits of cybersecurity certification and learn whether and how it provides training or proves experience or both, the pros and cons, how to start or approach getting certified, and more! Visit https://www.securityweekly.com/scw for all the latest episodes! Follow us on Twitter: https://www.twit…
 
Big Tech's punishment train has been en route for years, but now that it's almost arrived, are we getting onboard? Plus Mike's recent tech woes and Chris' special surprise waiting for him in the studio. Sponsored By: A Cloud Guru: A Cloud Guru now includes Cloud Playground. Azure, AWS, or GCP Sandboxes at your fingertips. Linode: Receive a $100 60-…
 
We’ve all worked with them. There is always that one developer who is called a “senior” developer. They’ll tell you that they have 12 years of experience, but after you watch them work for a while, you realize that they really have one year of experience, repeated 12 times. While this has been something that nearly every developer has noticed in th…
 
Guest Matthew Gracey-McMinn joins us from Netacea to speak with Dave about security issues with streaming services, Joe shares some follow-up from listener Jason about a bracelet sale mentioned a few episodes ago, Joe's story is from UMBC about AI-generated fake news reports, Dave's got a story about a replacement scam for a hardware wallet used fo…
 
Pramod Sadalage co-authored the book Refactoring Databases 15 years ago. The concepts remain hugely relevant today for those exploring microservices. We caught up with Pramod and Martin Fowler to hear about the genesis of the book and explore how the principles of refactoring work in a world of NoSQL databases.…
 
Do the SOLID principles still make sense? Carl and Richard talk to Dan North about SOLID, starting with a five-minute PubConf talk that Dan did about how SOLID was wrong. Meant to be humorous (it was PubConf after all), the SOLID fans took exception, and actually led to Dan exploring how SOLID could be reinterpreted... as CUPID. With a lot of back …
 
DNS Name Server Hijack Attack https://www.darkreading.com/vulnerabilities---threats/new-dns-name-server-hijack-attack-exposes-businesses-government-agencies/d/d-id/1341377 Paloalto Cortex XSOAR Vulnerablity https://security.paloaltonetworks.com/CVE-2021-3044 VMWare Carbon Black App Control Authentication Bypass https://www.vmware.com/security/advis…
 
This week in the Security Weekly News: Aaran Leyland guest hosts and talks Oddball, BDSM Videos, iPhone wifi hacks, South Korea, Russia, Carnival, and Google. All this and the returning Expert Commentary of Jason Wood! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly …
 
ReverseRat looks like a state-run espionage tool active in South and Central Asia. The US Justice Department seizes thirty-three sites run by media aligned with the Iranian government. Poland offers more clarity on a cyberespionage campaign it attributes to Russia. An intercept and inspection company’s executives are indicted for complicity with to…
 
There is a lot going down in the world right now. Whether it is because of the pandemic or not we can’t say but people are leaving their jobs in record numbers. However, there is a hidden opportunity lurking in this crisis, both for people to get new jobs and for companies to get new employees. So in today’s episode, we’ll be talking about tuning u…
 
Chris is a consultant and director of the Green Web Foundation. We discuss how he first become involved with Django, recent talks, and how to speed the transition of the web away from fossil fools. LINKS: Chris Adams personal site Greening Digital @mrchrisadams on Twitter [Branch Magazine - https://branch.climateaction.tech/] Greening Django: Talk …
 
It’s another Potluck! In this episode, Scott and Wes answer your questions about web components, gear, Docker, web dev frameworks, golden handcuffs, browser testing, SSR React, code prediction, and more! Sanity - Sponsor Sanity.io is a real-time headless CMS with a fully customizable Content Studio built in React. Get a Sanity powered site up and r…
 
#112: Are you still clicking around in consoles to create and manage your infrastructure? If so, you'll want to listen to today's episode with Rosemary Wang, the author of Essential Infrastructure as Code. Order your copy of Essential Infrastructure as Code at: https://www.manning.com/books/essential-infrastructure-as-code and be sure to use the co…
 
The quantity and quality of a company’s data can mean the difference between a major success or major failure. Companies like Google have used big data from its earliest days to steer their product suite in the direction consumers need. Other companies, like Apple, didn’t always use big data analytics to drive product design, but they do now. The c…
 
The quantity and quality of a company’s data can mean the difference between a major success or major failure. Companies like Google have used big data from its earliest days to steer their product suite in the direction consumers need. Other companies, like Apple, didn’t always use big data analytics to drive product design, but they do now. The c…
 
Today's podcast reports on a small Canadian firm hit by ransomware, a criminal marketplace offering stolen data to competitors of victim firms and another company's data left open by misconfigured databasesBy ITWC
 
This week, Ben Higgins and Ted Driggs of ExtraHop join Security Weekly to explore how behavior transparency can give organizations an advantage by distinguishing between expected noise and indications of compromise! Then, in the Leadership and Communications section, What is the hidden cost of maintaining legacy systems?, 10 Leadership Habits of Hi…
 
We're back after a short break with a new episode. We talk about what's new in Svelte and what we've been up to! Oh. And this is sort-of our 1 Year anniversary! 🥳 Music: Intro - Braden Wiggins a.k.a. Fractal (braden@fractal-hq.com) Notes: Scott Tolinski's LevelUp Tuts SvelteKit conversion livestream New CSS Custom Property Feature (Kev's REPL showc…
 
We chatted with three guests: Miguel Jetté: Head of AI R&D Josh Dong: AI Engineering Manager Jenny Drexler: Senior Speech Scientist When Jette was studying mathematics in the early 2000s, his focus was on computational biology, and more specifically, phylogenetic trees, and DNA sequences. He wanted to understand the evolution of certain traits and …
 
Phishing asking recipients not to report abuse https://isc.sans.edu/forums/diary/Phishing+asking+recipients+not+to+report+abuse/27556/ PyPi Cryptomining Malware https://blog.sonatype.com/sonatype-catches-new-pypi-cryptomining-malware-via-automated-detection Dovecot TLS Implementation Vulnerability https://hackerone.com/reports/1204962 (see the link…
 
Picture of the Week. Another day, another Chrome 0-day. Ransomware perpetrators are increasingly purchasing access. A weird bug in iOS Wi-Fi. An Early Preview of Windows 11. The Security Now! Podcast has found a new purpose... SpinRite. Avaddon Ransonomics. We invite you to read our show notes at https://www.grc.com/sn/SN-824-Notes.pdf Hosts: Steve…
 
Trisha Gee and Kevlin Henney of 97 things every Java developer should know discusses their book, which is a collection of essays by different developers covering the most important things to know. Host Felienne spoke withGee and Henney about all things...By IEEE Computer Society
 
Malicious Google ads for Signal and Telegram are being used to lure the unwary into downloading an info-stealer. LV ransomware looks like repurposed REvil. A study of the US Defense Industrial Base finds that many smaller firms, particularly ones that specialize in research and development, are vulnerable to ransomware attacks. Rick Howard ponders …
 
Most of us (especially in the midst of global stay-at-home orders) experience our favourite brands digitally far more than we do physically. Great creative and experience design is fascinating; especially knowing it can make or break attraction and loyalty. Adam Smith, of Tension (https://wearetension.com) is in the business of partnering with firm…
 
In this episode we discuss software investing, business, and the future with David Rosenthal, co-host of the Acquired podcast. This interview was also recorded as our very first video podcast. Check out the video on the Software Daily YouTube channel. Sponsorship inquiries: sponsor@softwareengineeringdaily.com The post Software Investing with David…
 
In this episode we discuss software investing, business, and the future with David Rosenthal, co-host of the Acquired podcast. This interview was also recorded as our very first video podcast. Check out the video on the Software Daily YouTube channel. Sponsorship inquiries: sponsor@softwareengineeringdaily.com The post Software Investing with David…
 
This week, we welcome Nuno Loureiro & Tiago Mendo from Probely to discuss some Challenges of DAST Scanners, and their Adoption by Developers! Then, in the AppSec News John and Mike discuss: SLSA framework for supply chain integrity, Wi-Fi network of doom for iPhones, seven-year old systemd privesc, $30K for an API call, Codecov refactors from Bash,…
 
Jon and Brian are penetration testers who both worked at a place called RedTeam Security. They’re paid to break into buildings and hack into networks to test the security of those buildings. In this episode they bring us a story of how they prepare and execute a mission like this. But even with all the preparation, something still goes terribly wro…
 
Attack and Defend: Distributed Web Applications (free Webcast) https://www.sans.org/webcasts/attack-defend-modern-distributed-applications-119610 Darkside Impersonators https://www.helpnetsecurity.com/2021/06/21/impersonating-darkside/ Tesla RAT COVID-19 Vaccination Phish https://threatpost.com/agent-tesla-covid-vax-phish/167082/ Tor Browser Update…
 
Complete information games are games where every player has information about the game sequence, strategies, and payoffs throughout gameplay. Playing chess, for example, relies on knowing the location of every piece everywhere on the board. In an incomplete information game like Minecraft, you continually gain new information during gameplay. Until…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login