show episodes
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Paul Ford and Ben Popper, the series features questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. Founded in 2008, Stack Overflow is empowering the world to develop technology through collective knowledge. It’s best known for being the largest, most trusted online commun ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Curiouscast and Global News present the second season in the “Rising” series: China Rising is an in-depth investigation into modern China and its strained relations with the West. Hosted by Global News Senior Correspondent Jeff Semple, this ten episode season investigates allegations Beijing is applying pressure and working to infiltrate the upper echelons of power in Western countries, including Canada. The Chinese government is accused of deploying a range of tactics, from disinformation t ...
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
S
Self-Hosted

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
Loading …
show series
 
Ipek Ozkaya joined host Jeff Doolittle to discuss a book she co-authored entitled Managing Technical Debt. In the book, Ozkaya describes nine principles of technical debt management to aid software companies in identifying, measuring, tracking...By IEEE Computer Society
 
Today we’re talking to Matt Rickard about his blog post, Reflections on 10,000 Hours of Programming. Matt was clear to mention that these reflections are purely about coding, not career advice or other soft skills. These reflections are just about deliberately writing code for 10,000 hours, which also correlates with the number of hours needed to m…
 
#127: Even though it is 2021, many application development organizations still follow the decades-old process of throwing software over the wall to an operations team to deploy. This practice causes operational difficulties like organizational silos, poor collaboration, and poor user experience. As software continues to become more complicated, app…
 
By most accounts, demand for software engineers exceeds supply. Not just anyone can develop this skill set to the level required to deliver enterprise-grade production code. For those that can, companies are incentivized to take extra measures to ensure software engineers are as productive as possible. The pace of business is often throttled by the…
 
Tanner builds open source software that is currently used by hundreds of thousands of developers at companies ranging from fortune 500 companies all the way down to startups and indie developers. He has a focus in JavaScript using React, Remote/Server State Management, Data Grids/Tables, Data Visualization, and Enterprise Application Architecture. …
 
Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. …
 
A CISA-issued Joint Advisory warns of threats and vulnerabilities at water and wastewater treatment facilities. CISA issues twenty-two other industrial control system advisories. Andrea Little Limbago from Interos on trends in the human element of security. Our guest is Gidi Cohen from Skybox with Vulnerability and Threat Trends. And the Governor o…
 
This week I wrap up several loose ends from previous shows and clear out my notes.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.Listen to A…
 
When you have to predict, you're likely to have error in your prediction. Sometimes that error is easily handled - other times, it can be catastrophic in effect. The next time you have the urge to predict into the future, ask yourself - what benefit do you gain from predicting this now? Can you avoid unnecessary prediction all together with a diffe…
 
New "Yanluowang" ransomware variant discovered Financial regulator addresses hybrid working security risks DocuSign phishing campaign targets low-ranking employees Thanks to our episode sponsor, Bitsight These are challenging times for security professionals. From managing third party supply chain risk, to quantifying financial exposure, to reducin…
 
This week we discuss the real-world use of containers, recap the Google Cloud Next announcements and make some Apple predications. Plus, how often do you wash jeans…? Rundown Containers in the Real World 10 trends in real world container use What Workloads Do Businesses Run on Kubernetes? Google Cloud Next `21 What’s New at Google Cloud Next ‘21 In…
 
Graybeard conference alert! Eran and Ryan both started their technology journeys on the venerable Commodore 64. During his academic days, Eran helped to map all the BGP (background gateway protocol) gateways in the world. This got a fair bit of press recently during the six hour Facebook outage. Nexar provides smart dashcams and an app that help ca…
 
0 A.D. is a free and open-source real-time strategy video game under development by Wildfire Games. It is a historical war and economy game made an international group of volunteer game developers and it is AMAZING. The game is cross-platform, playable on Windows, macOS, Linux, FreeBSD, OpenBSD, even Raspberry Pi! Stanislas Dolcini has been working…
 
Data breach extortion seems to be an emerging criminal trend. Notes on a darknet market’s retirement. Verizon advises Visible users to look to their credentials. Windows users’ attention is drawn to seven potentially serious vulnerabilities (all patchable). The Necro botnet is installing Monero cryptojackers. Organizing an international response to…
 
When America withdrew from Afghanistan it left people behind. Interpreters, aid workers, allies, and even some U.S. citizens remained in the country as the Taliban took over. Since the official U.S. military exit, dozens of groups have sprung up to try to help people safely flee the country. Not all of them are competent, but most of them are askin…
 
Windows 11 Patch Tuesday causes AMD performance issues Student used zero-day for school prank US leaves China and Russia off the anti-ransomware invite list Thanks to our episode sponsor, Bitsight Did you know that organizations with poor patching practices are 8 times more likely to experience a ransomware incident? From managing third party suppl…
 
It’s fun being a mid-level developer. You probably still enjoy writing code (this is true of seniors too, but it’s a different thing at this level). Everything is still fairly new and you haven’t seen the same old crap over and over again for years. Further, there is still more stuff to learn. And once you have the basics down, the whole world of d…
 
Guest Marina Ciavatta CEO at Hekate talks with Dave about some of her social engineering and pen testing experiences, Dave's got a story is about getting your family to use a password manager, Joe's story is about NFTs (non-fungible tokens) and scams that have arisen around them, and our Catch of the Day is from listener William and it turns out Da…
 
What's coming for the next version of C#? Carl and Richard chat with Mads Torgersen about some of the new features in C# 10 shipping with .NET 6. Mads talks about how a year is not a lot of time for building language features - but it does create a steady stream of new language ideas explored and tested before being finalized into the language. Whi…
 
A Chinese-speaking APT is distributing the MysterySnail RAT in what appears to be a cyberespionage campaign. Some users still haven’t patched vulnerable SolarWinds instances. Notes on yesterday’s Patch Tuesday. The US-convened international ransomware conference kicked off today, and Russia wasn’t invited. Former users of a criminal booter service …
 
The theme of this episode is a surge of creativity in the Biden administration as it searches for ways to regulate cybersecurity and cryptocurrency without new legislative authority. Paul Rosenzweig lays out the Department of Homeland Security’s entries in the creativity sweepstakes: New (and frankly pretty modest) cybersecurity directives to the r…
 
In this episode of Syntax, Scott and Wes talk about running a podcast — recording, sponsoring, where to start, and more! Freshbooks - Sponsor Get a 30 day free trial of Freshbooks at freshbooks.com/syntax and put SYNTAX in the “How did you hear about us?” section. LogRocket - Sponsor LogRocket lets you replay what users do on your site, helping you…
 
#128: You know that securing environments with a secrets manager is something that needs constant upkeep. Sometimes secrets management can be difficult and complex to handle. Thankfully, there are universal secrets managers which make the process of managing secrets simple for everyone, not just the DevOps and security teams. Today, we talk with Br…
 
Random choice may actually be your best bet. At the very least, starting with random is a good exercise in self control, and will help reveal information more easily than intuitive guessing might. Give random a chance! 🙏 Today's Episode is Brought To you by: Auth0 Auth0 is here to solve your login problems, for good. Auth0 provides simple, secure, …
 
Olympus suffers second cyberattack in 2021 Microsoft’s Patch Tuesday squashes four zero-day vulns White House directs federal agencies to step up EDR Thanks to our episode sponsor, Bitsight In spite of all the recent attacks, did you know that only 17% of organizations continuously monitor their third party vendors? From managing third party supply…
 
Microsoft Patch Tuesday https://isc.sans.edu/forums/diary/Microsoft+October+2021+Patch+Tuesday/27928/ Adobe Patches https://helpx.adobe.com/security/security-bulletin.html PyPi Remove mitmproxy2 Module https://twitter.com/maximilianhils/status/1447525552370458625 https://web.archive.org/web/20211012105244/https://gist.github.com/mhils/7ff29d50b25a1…
 
Today, we're joined by Michelle Price, CEO of AustCyber to discuss the return of the annual Australian Cyber Week, a week-long series of events and activities, this year to be held from 25-29 October 2021. The week combines virtual and in-person sessions to generate awareness about the Australian cyber security industry and showcase local innovatio…
 
Picture of the week. Windows 11 Watch: "AllowUpgradesWithUnsupportedTPMOrCPU" AMD processors running some apps up to 15% slower. The Windows 10 taskbar on Windows 11. Microsoft is disagreeing... with themselves. We have an update on the Windows Explorer RAM leak I mentioned previously... VirtualBox and Windows HyperVisors don't get along. Dropped U…
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: UK, Netherlands and Australia promise offensive response to big ticket ransomware Wave of major cyber regulation and legislation in USA Iran up in yer O365s, Russians in yer gmails Submarine spy guy would have been fine, if he didn’t make one very big mis…
 
Ipek Ozkaya joined host Jeff Doolittle to discuss a book she co-authored entitled Managing Technical Debt. In the book, Ozkaya describes nine principles of technical debt management to aid software companies in identifying, measuring, tracking and paying down technical debt. During the episode, she provides some unique perspectives on the definitio…
 
Teheran is running password spraying attacks (especially on Thursdays and Sundays). More on the renewed popularity of DDoS attacks. NCSC warns British businesses against ransomware. Two journalists win the Nobel Peace Prize. Joe Carrigan shares his thoughts on GriftHorse. Our guest is Bindu Sundaresan from AT&T Cybersecurity football season and cyb…
 
Microsoft report details the changing cybercrime landscape LibreOffice issues fix for signed document spoofing You got nuclear secrets in my peanut butter! Thanks to our episode sponsor, Bitsight Did you know that 1-in-10 organizations are now creating cybersecurity-specific committees at the board level? From managing third party supply chain risk…
 
HarperDB is a startup that focuses on highly scalable databases that handle real-time data. Harper is built on Node.js and Express with a little help from Fastify. They know where they excel and where they don't. High data throughput like gaming and vision, great! High data resolution and transactional software like financial applications, not so g…
 
Non HTTP Requests Hitting Web Server https://isc.sans.edu/forums/diary/Things+that+go+Bump+in+the+Night+Non+HTTP+Requests+Hitting+Web+Servers/27924/ Apple Updates iOS/iPadOS to 15.0.2 https://saaramar.github.io/IOMFB_integer_overflow_poc/ https://support.apple.com/en-us/HT212846 Weak SSH Keys Used with GitKraken https://github.blog/2021-10-11-githu…
 
In early 2021, Codecov experienced a serious security breach, and today on the show we are joined by their CEO and CTO to get an insider's perspective on the events! We have an enlightening conversation with Jerrod Engelberg and Eli Hooten about what exactly happened, how they reacted, and the important foundations that were already in place that a…
 
In this episode, Dave and Jamison answer these questions: Questions Listener Anonomomonous asks, How do you influence people and change minds? I work on a team where things often happen by inertia. I have a lot of ideas about how to improve our process, scope our work better, collaborate more effectively etc. I’m comfortable with sharing my concern…
 
David is a Software Engineer, Mentor, Organizer, Volunteer, Speaker, Workshop Creator, and unabashed Career Changer, specializing in C# .NET, N-Tier and Microservice Architecture. Links https://twitter.com/_davewritescode https://davewritescode.com/ https://www.linkedin.com/in/davewritescode/ Resources Microservices Patterns https://github.com/scie…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login