show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
How does design impact the world around you? Discover how graphic designers, UX designers, illustrators, typographers, artists, activists and other creatives empower creativity for all. Can the design of an app, a logo, a graphic, a sound effect, or an illustration make your life better? Find out with Adobe’s Khoi Vinh, one of Fast Company’s Most Creative People in Business.
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Sara Chipps, Paul Ford, and Ben Popper, the series will feature questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. About Stack Overflow Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and buil ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Loading …
show series
 
Trisha Gee and Kevlin Henney of 97 things every Java developer should know discusses their book, which is a collection of essays by different developers covering the most important things to know. Host Felienne spoke withGee and Henney about all things...By IEEE Computer Society
 
On this episode we’re talking with our good friend Mat Ryer whom you may know from the Go Time podcast. Mat created an awesome open source tool for putting just about anything in your Mac’s toolbar. It was originally written in Objective-C, but it just got a big rewrite in Go and abig rename from BitBar to xbar. If you don’t use a Mac don’t hit ski…
 
Today's episode reports on a fake Darkside group sending threatening emails, how Google hopes to stop software supply chain attacks, another Carnival cruise line hack and the lastest vishing scams
 
Flutter is a UI toolkit developed by Google that helps developers build natively compiled applications for mobile, web, desktop, and embedded devices from a single code base. Development is fast because the screen “hot reloads” as you develop, the architecture is layered for fast and expressive designs, and its widgets incorporate all critical plat…
 
ReverseRat looks like a state-run espionage tool active in South and Central Asia. The US Justice Department seizes thirty-three sites run by media aligned with the Iranian government. Poland offers more clarity on a cyberespionage campaign it attributes to Russia. An intercept and inspection company’s executives are indicted for complicity with to…
 
There is a lot going down in the world right now. Whether it is because of the pandemic or not we can’t say but people are leaving their jobs in record numbers. However, there is a hidden opportunity lurking in this crisis, both for people to get new jobs and for companies to get new employees. So in today’s episode, we’ll be talking about tuning u…
 
Chris is a consultant and director of the Green Web Foundation. We discuss how he first become involved with Django, recent talks, and how to speed the transition of the web away from fossil fools. LINKS: Chris Adams personal site Greening Digital @mrchrisadams on Twitter [Branch Magazine - https://branch.climateaction.tech/] Greening Django: Talk …
 
It’s another Potluck! In this episode, Scott and Wes answer your questions about web components, gear, Docker, web dev frameworks, golden handcuffs, browser testing, SSR React, code prediction, and more! Sanity - Sponsor Sanity.io is a real-time headless CMS with a fully customizable Content Studio built in React. Get a Sanity powered site up and r…
 
#112: Are you still clicking around in consoles to create and manage your infrastructure? If so, you'll want to listen to today's episode with Rosemary Wang, the author of Essential Infrastructure as Code. Order your copy of Essential Infrastructure as Code at: https://www.manning.com/books/essential-infrastructure-as-code and be sure to use the co…
 
The quantity and quality of a company’s data can mean the difference between a major success or major failure. Companies like Google have used big data from its earliest days to steer their product suite in the direction consumers need. Other companies, like Apple, didn’t always use big data analytics to drive product design, but they do now. The c…
 
Today's podcast reports on a small Canadian firm hit by ransomware, a criminal marketplace offering stolen data to competitors of victim firms and another company's data left open by misconfigured databasesBy ITWC
 
Call it luck, serendipity, or chance - all of these unexpected moments of life require entropy to occur. On the other hand, if we don't control our lives to some extent, we'll never be able to make meaningful progress in a chosen direction. How do we invite luck into our lives without floundering in place endlessly? ✨ Sponsor: Remote Works (Podcast…
 
We're back after a short break with a new episode. We talk about what's new in Svelte and what we've been up to! Oh. And this is sort-of our 1 Year anniversary! 🥳 Music: Intro - Braden Wiggins a.k.a. Fractal (braden@fractal-hq.com) Notes: Scott Tolinski's LevelUp Tuts SvelteKit conversion livestream New CSS Custom Property Feature (Kev's REPL showc…
 
We chatted with three guests: Miguel Jetté: Head of AI R&D Josh Dong: AI Engineering Manager Jenny Drexler: Senior Speech Scientist When Jette was studying mathematics in the early 2000s, his focus was on computational biology, and more specifically, phylogenetic trees, and DNA sequences. He wanted to understand the evolution of certain traits and …
 
Phishing asking recipients not to report abuse https://isc.sans.edu/forums/diary/Phishing+asking+recipients+not+to+report+abuse/27556/ PyPi Cryptomining Malware https://blog.sonatype.com/sonatype-catches-new-pypi-cryptomining-malware-via-automated-detection Dovecot TLS Implementation Vulnerability https://hackerone.com/reports/1204962 (see the link…
 
Picture of the Week. Another day, another Chrome 0-day. Ransomware perpetrators are increasingly purchasing access. A weird bug in iOS Wi-Fi. An Early Preview of Windows 11. The Security Now! Podcast has found a new purpose... SpinRite. Avaddon Ransonomics. We invite you to read our show notes at https://www.grc.com/sn/SN-824-Notes.pdf Hosts: Steve…
 
Trisha Gee and Kevlin Henney of 97 Things Every Java Developer Should Know discuss their book, which is a collection of essays by different developers. Host Felienne spoke with Gee and Henney about Java, including how to use immutability in Java, the value of type inference, and how to use your IDE most effectively when […]…
 
Malicious Google ads for Signal and Telegram are being used to lure the unwary into downloading an info-stealer. LV ransomware looks like repurposed REvil. A study of the US Defense Industrial Base finds that many smaller firms, particularly ones that specialize in research and development, are vulnerable to ransomware attacks. Rick Howard ponders …
 
Most of us (especially in the midst of global stay-at-home orders) experience our favourite brands digitally far more than we do physically. Great creative and experience design is fascinating; especially knowing it can make or break attraction and loyalty. Adam Smith, of Tension (https://wearetension.com) is in the business of partnering with firm…
 
CAGED System Software development effort estimation Build vs. Buy Join Us On Twitch & Discord! Join dnccast each Thursday at 6 pm Pacific for the live recordings of each episode! We also have a community Discord server! It's an all-inclusive community that loves to talk tech, music, and games. Join us! Show Notes Archive If you're looking for a lin…
 
In this episode we discuss software investing, business, and the future with David Rosenthal, co-host of the Acquired podcast. This interview was also recorded as our very first video podcast. Check out the video on the Software Daily YouTube channel. Sponsorship inquiries: sponsor@softwareengineeringdaily.com The post Software Investing with David…
 
Jon and Brian are penetration testers who both worked at a place called RedTeam Security. They’re paid to break into buildings and hack into networks to test the security of those buildings. In this episode they bring us a story of how they prepare and execute a mission like this. But even with all the preparation, something still goes terribly wro…
 
Perl is the Application Director for Unqork's professional services organization. In that role she works closely with clients to help prototype and develop their applications. You can read more about the software Unqork helped New York City create to deliver food during the pandemic here. Beach is a community manager at Unqork and has written a gre…
 
Attack and Defend: Distributed Web Applications (free Webcast) https://www.sans.org/webcasts/attack-defend-modern-distributed-applications-119610 Darkside Impersonators https://www.helpnetsecurity.com/2021/06/21/impersonating-darkside/ Tesla RAT COVID-19 Vaccination Phish https://threatpost.com/agent-tesla-covid-vax-phish/167082/ Tor Browser Update…
 
Complete information games are games where every player has information about the game sequence, strategies, and payoffs throughout gameplay. Playing chess, for example, relies on knowing the location of every piece everywhere on the board. In an incomplete information game like Minecraft, you continually gain new information during gameplay. Until…
 
The South Korean nuclear research organization sustained an apparent cyberespionage incident. Norway’s investigation of its 2018 breach of government networks concludes that China’s APT31 was behind it. Poland accuses Russia in a long-running email hacking case. Our guest is Mark Testoni from SAP NS2 on where the Justice Department should focus dur…
 
In this Hasty Treat, Scott and Wes talk about CSRF (Cross Site Request Forgery)! Prismic - Sponsor Prismic is a Headless CMS that makes it easy to build website pages as a set of components. Break pages into sections of components using React, Vue, or whatever you like. Make corresponding Slices in Prismic. Start building pages dynamically in minut…
 
It was as a teenager that Albert Gonzalez–one of the few greatest cybercriminals in history–developed the obsession that would go on to ruin his life. Gonzalez and some of his friends would go on to pull off some of the most remarkable crimes in the history of computers – but they just didn’t know when to stop. If they did, they might have gotten a…
 
When you think about probabilities, you likely think in one of two ways. We'll talk about both of these models for probabilistic analysis, their drawbacks, and decision-making in the face of uncertainty. ✨ Sponsor: Square Payment acceptance can be one of the most painful parts of building a web app for a business. When implementing checkout, you wa…
 
New iPhone bug can permanently break WiFi simply by connecting to a rogue hotspot New York City Law Department hacked SASE: 64% of businesses are adopting or plan to adopt in the next year Thanks to our episode sponsor, Viakoo If you discover vulnerable IoT devices on your network, stop port-blocking them. Instead, use Viakoo to remediate vulnerabi…
 
If Comic Sans showed up at a house party, would it be welcome or shown the door? In this episode, the Wireframe team parties down with a wild array of fonts, good and bad, to learn about the rise of novelty typefaces like Comic Sans and the proliferation of the now all-too-familiar geometric sans serif typeface. They’ll find out what the popularity…
 
In this episode, we talk about how to build communities and diversify tech with Veni Kunche, founder of Diversify Tech. Veni talks about her struggles landing her first coding job, often being the only woman of color at tech meetups in the past, and how she set out to diversify tech. Show Links TwilioQuest (sponsor) DevDiscuss (sponsor) DevNews (sp…
 
Network Forensics on Azure VMs (Part #2) https://isc.sans.edu/forums/diary/Network+Forensics+on+Azure+VMs+Part+2/27538/ Google Open Redirect Being Abused https://isc.sans.edu/forums/diary/Open+redirects+and+why+Phishers+love+them/27542/ Easy Access to the NIST RDS Database https://isc.sans.edu/forums/diary/Easy+Access+to+the+NIST+RDS+Database/27544…
 
We continue our discussion of Designing Data-Intensive Applications, this time focusing on multi-leader replication, while Joe is seriously tired, and Allen is on to Michael’s shenanigans. For anyone reading this via their podcast player, this episode’s show notes can be at https://www.codingblocks.net/episode161, where you can join the conversatio…
 
CEO and co-founder of Orca Security Avi Shua shares his thoughts on ways to succeed in cybersecurity. Avi's excitement about cybersecurity began when he was 13 as he tried to think of ways to get around the school's network security. He joined the Israeli Army's Intelligence Unit 8200 and experienced some unique cybersecurity training programs that…
 
Guests Gage Mele and Yury Polozov join Dave to talk about Anomali's research "Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes." Anomali Threat Research identified malicious samples that align with the Russia-sponsored cyberespionage group Primitive Bear’s (Gamaredon, Winterflounder) tactics, techniques, and procedures (TTPs). Primitiv…
 
This week we’re talking with Pia Mancini about the latest updates to the mission of Open Collective. Earlier this year Open Collective announced “Funds for Open Source.” The idea is simple, make it easy for companies to invest in open source, and they will. Also, since recording this episode, Pia and the team at Open Collective along with Gitcoin a…
 
In this episode, Misko Hevery is featured in an interview with Tracy Lee on leaving Angular, and his new project Builder. He talks about a new way to think about frameworks that our community should start embracing, as well as, why he's so excited about Builder, the space, and what he will be doing next. Host: Tracy Lee (@ladyleet) - CEO, This Dot …
 
Phishing, with a bogus hardware wallet as bait. Empty threats from a DarkSide impersonator. Cyber vigilantes may be distributing anti-piracy malware. Data security incidents at a cruise line and a US grocery chain. Malek Ben Salem from Accenture looks at optimizing security scanning. Our guest is Edward Roberts of Imperva on their 2021 Bad Bots Rep…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login