Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Welcome to The Data Flowcast: Mastering Apache Airflow ® for Data Engineering and AI— the podcast where we keep you up to date with insights and ideas propelling the Airflow community forward. Join us each week, as we explore the current state, future and potential of Airflow with leading thinkers in the community, and discover how best to leverage this workflow management system to meet the ever-evolving needs of data engineering and AI ecosystems. Podcast Webpage: https://www.astronomer.io ...
  continue reading
 
Artwork

1
Conqra

Grant Brown

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This podcast will give you up to date information on products designed and released by Conqra. For more information visit: www.conqra.com
  continue reading
 
Welcome to Data Brew by Databricks with Denny and Brooke! In this series, we explore various topics in the data and AI community and interview subject matter experts in data engineering/data science. So join us with your morning brew in hand and get ready to dive deep into data + AI! For this first season, we will be focusing on lakehouses – combining the key features of data warehouses, such as ACID transactions, with the scalability of data lakes, directly against low-cost object stores.
  continue reading
 
Artwork

1
TechSNAP OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
Streaming Audio: Apache Kafka® & Real-Time Data

Confluent, founded by the original creators of Apache Kafka®

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Streaming Audio features all things Apache Kafka®, Confluent, real-time data, and the cloud. We cover frequently asked questions, best practices, and use cases from the Kafka community—from Kafka connectors and distributed systems, to data mesh, data integration, modern data architectures, and data mesh built with Confluent and cloud Kafka as a service. Join our hosts as they stream through a series of interviews, stories, and use cases with guests from the data streaming industry. Apache®️, ...
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
Developer Voices

Kris Jenkins

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Deep-dive discussions with the smartest developers we know, explaining what they're working on, how they're trying to move the industry forward, and what we can learn from them. You might find the solution to your next architectural headache, pick up a new programming language, or just hear some good war stories from the frontline of technology. Join your host Kris Jenkins as we try to figure out what tomorrow's computing will look like the best way we know how - by listening directly to the ...
  continue reading
 
Core Internal Medicine via following series: 5 Pearls || Clinically relevant pearls Mind the Gap || Why do we do what we do? Gray Matters || Management Reasoning Hoofbeats || Dissecting clinical reasoning At the Bedside || Explore everyday challenges
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
True Crime Arizona

Briana Whitney

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Arizona’s Family journalists Briana Whitney and Serjio Hernandez take a deep dive into both unsolved and solved cases around Arizona — retracing steps, uncovering new evidence, and revealing new theories from those involved in the investigations.
  continue reading
 
Artwork

1
The Reckon Yard Podcast

Jerry Wayne Longmire, Bleav

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
20 year Standup Comedian and creator of Truck Astrology, ShopTalk, and devotee of the Church of Internal Combustion, Jerry Wayne Longmire delves into his own history with automobiles to find the catalysts that led him to be a lifelong lover of fine machines.
  continue reading
 
Here Before, Hear Now with Colton Shone is an exciting new endeavor for the Good Morning Arizona anchor. With the perspective of his Navajo background, Colton wants to bring conversations surrounding Indian Country to everyone. From entertainers to journalists and leaders to entrepreneurs, hear from people who bring an indigenous perspective.
  continue reading
 
Explore the history of early Texas as you’ve never heard it before. The most recent season ("Lipan Apocalypse") unveils the legacy of the Lipan Apaches on modern Texas. Season 6 recounts the outsized impact of José Francisco Ruíz on the state's history. Season 5 traces the roots of Texans' unique psychology - their "Texanity" - to the technological innovations that shaped its people. Season 4 relates the largely unknown story of the Republic of the Rio Grande. Season 3 tells the remarkable t ...
  continue reading
 
Artwork

1
The Binary Breakdown

The Binary Breakdown

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Binary Breakdown is your go-to podcast for exploring the latest in computer science research and technology. Each episode dives into groundbreaking papers, emerging technologies, and the ideas shaping our digital world. Whether you're a tech enthusiast, a computer science student, or a seasoned professional, Binary Breakdown decodes complex topics into insightful discussions, connecting the dots between theory and real-world application. Join us as we break down binary, byte by byte, to unco ...
  continue reading
 
SheCanCode’s ‘Spilling the T’ podcast offers conversations with top female voices in the tech sector, as we plunge into the latest topics that have captured our imagination recently. Learn about a range of tech disciplines and how to establish a career in them - from coding, AI, cyber, starting a business, career transitions and even diversity in space, we lay it out bare and Spill the T on everything you need to know.
  continue reading
 
Artwork

1
Programmers Quickie

Software Engineering

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Software Engineering Best Practices, System Design, High Scale, Algorithms, Math, Programming Languages, Statistics, Machine Learning, Databases, Front Ends, Frameworks, Low Level Machine Structure, Papers and Computing, Computer Science Book Reviews - Everything!
  continue reading
 
A free-form podcast about transformation, growth, and purpose; elevating and expanding the super-conscious mind while honoring the down-to-earth wisdom that keeps us grounded and real. "Nothing you do matters, unless what you do matters." Amadon DellErba is on a journey of self-mastery. Join him in the exploration of the spiritual, psychological, intellectual, and emotional elements that make up the mortal life. Equal parts profound and profane; sacred and secular, "Get Real or Die Trying" i ...
  continue reading
 
Artwork

1
2 Degrees Out West

Western Resource Advocates

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Listen in as we examine the story behind some of the most pressing conservation issues facing the West. 2 Degrees Out West is a podcast for advocates and decision makers who want to fight climate change and its impacts across the West. On 2° out west we talk with climate experts and advocates to bring you stories, experiences, and insights from their work in the places we call home. We find, legislators, researchers, organizers, conservation advocates, and more to ask about what we can do to ...
  continue reading
 
Welcome to the Preset Podcast, the home of "Analytics Everywhere" and "Designated Driver". Analytics Everywhere discusses wide-ranging topics in business intelligence and data engineering, and Designated Driver is a great way to get to know the database platforms of the world over a beer. These podcasts are dedicated to explore next-generation data tools and the impact they have on data teams.
  continue reading
 
Artwork

1
Stories to Tell

Mark Ryerson

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Stories to Tell, where extraordinary tales emerge. Join us as we dive into the fascinating narratives that unfold in the day-to-day experiences of individuals just like you. In each episode, Mark Ryerson sits down with everyday heroes, adventurers, and dreamers to unearth the gems hidden within their personal stories. From moments that will have you doubled over in laughter to heartwarming anecdotes that resonate deeply, our guests share the highs, the lows, and everything in betw ...
  continue reading
 
Artwork
 
We are a Podcast/YouTube Channel with 30+ Trips to Las Vegas & Still finding NEW FUN things to do around The City. Not Only Focusing on the Strip & Downtown, But businesses and places to check out all around Las Vegas & Surrounding areas. With Awesome Interviews from Casino CEO’s & Host, Restaurant Owners & Chefs, Even YouTubers, Bloggers & Podcasters. Fun Vlogs throughout Sin City. I even Show you Tips & Tricks around Las Vegas. Also share Fun Casino & Gambling & Las Vegas Stories. Be sure ...
  continue reading
 
Artwork

1
North Idaho Experience

North Idaho Experience

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Welcome to North Idaho Experience – your one-stop podcast for discovering what it’s truly like to live, work, and thrive in North Idaho! Join us as we sit down with local business owners, community leaders, and fascinating locals who share their stories and insights on life in this unique region. From the real estate market and lifestyle tips to prepping and outdoor adventures, each interview gives you an insider's perspective on what makes North Idaho such a special place to call home. What ...
  continue reading
 
Artwork

1
Ear Scents

Ear Scents

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Collabing Ideas To Create Greatness. Sharing my love for music through my experiences, mindset, and conversations. Topics will include Music Production, Music Reviews, Trending Topics, Hip Hop Culture, and more.
  continue reading
 
Artwork
 
Sabrina’s a film buff. Robin’s a bimbo. Together they will brave the twists and turns that await them as they explore the colossal filmography of B-movie legend Roger Corman, one flick at a time.
  continue reading
 
Artwork
 
Tales at Scale cracks open the world of analytics projects. We’ll be diving into Apache Druid but also hearing from folks in the data ecosystem tackling everything from architecture to open source, from scaling to streaming and everything in between- brought to you by Imply.
  continue reading
 
Loading …
show series
 
Innovation in orchestration is redefining how engineers approach both traditional ETL pipelines and emerging AI workloads. Understanding how to harness Airflow’s flexibility and observability is essential for teams navigating today’s evolving data landscape. In this episode, Anu Pabla, Principal Engineer at The ODP Corporation, joins us to discuss …
  continue reading
 
Students Imani Haven and Carmen Thompson from Dishchii'bikoh Community School are competing in the National History Day. They have advanced to the national competition, using the platform as a way to spread awareness for the Missing and Murdered Indigenous Women crisis. The students centered their research on Emily Pike, a young Indigenous girl who…
  continue reading
 
How do you retrofit a clustered data-processing system to use cheap commodity storage? That’s the big question in this episode as we look at one of the many attempts to build a version of Kafka that uses object storage services like S3 as its main disk, sacrificing a little latency for cheap, infinitely-scalable disks. There are several companies t…
  continue reading
 
Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
  continue reading
 
Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
  continue reading
 
🔹 What is invasive fungal disease, and who is most at risk for developing invasive fungal disease? (~ 02:46) 🔹 What are the main classes of fungi? (~11:35) 🔹 What are the pros and cons of B-D Glucan and Galactomannan (~19:16) 🔹 How to increase the yield of blood cultures? How to interpret yeast growth in sputum/BAL and urine cultures? (~ 30:42) 🔹 H…
  continue reading
 
Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
  continue reading
 
🔴 Seth and Dave sit down with Nate Lewis and Brad Johnson from The Innocent, a nonprofit dedicated to empowering law enforcement to take down child predators and human traffickers. From heart-wrenching survivor stories in North Africa and Thailand to proactive sting operations in the U.S., this conversation exposes the dark truths of child exploita…
  continue reading
 
OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
  continue reading
 
In this episode of the SheCanCode podcast, we’re joined by Charlotte Seiler and Réka Leisztner from the Digital Consulting team at Zühlke - two women with distinctly different career journeys but one powerful shared purpose: to drive more human-centered, effective innovation in the digital space. Charlotte brings deep experience in innovation and e…
  continue reading
 
Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
  continue reading
 
An airhacks.fm conversation with David Kral (@VerdentDK) about: Helidon Declarative as a new feature set for Helidon SE,build-time dependency injection with zero reflection capability,code generation approach that creates actual Java source files instead of bytecode manipulation,Service Registry as an enhanced Java service loader with ordering capa…
  continue reading
 
Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
  continue reading
 
The orchestration layer is foundational to building robust AI- and ML-powered data pipelines, especially in complex hybrid enterprise environments. IBM’s partnership with Astronomer reflects a strategic alignment to simplify and scale Airflow-based workflows across industries. In this episode, we’re joined by IBM’s Senior Product Manager, BJ Adesoj…
  continue reading
 
Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
  continue reading
 
vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
  continue reading
 
In this deeply emotional and powerful interview, we sit down with Angie Sedore, founder of Safe Harbor, a nonprofit on a mission to rescue men, women, and children from human trafficking. Angie shares her shocking personal story of surviving sex trafficking, her recovery, and how she now helps others find freedom and healing. From grooming and mani…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
  continue reading
 
In this episode Hannah Cooke from Charlie Oscar shares her unconventional journey into tech, proving that transferable skills can open doors to exciting opportunities. While not in a traditional tech role, she leads product builds, emphasizing the power of project management, problem-solving, and communication. Hannah offers practical advice for br…
  continue reading
 
🔹What are clinically relevant limitations of an A1c vs. a CGM (1:40) 🔹What do the different parts of the ambulatory glucose profile tell you? (09:59) 🔹What are common pitfalls, medications, lifestyle patterns that are important to ask your patient about when seeing them for a visit to manage blood sugar? (15:19) 🔹 How can you titrate insulin based …
  continue reading
 
An airhacks.fm conversation with Volker Simonis (@volker_simonis) about: explanation of corretto as an openJDK distribution with support for multiple platforms and Java versions,insights into the build and certification process for Corretto releases including TCK testing,discussion of the security vulnerability group and embargo process for Java se…
  continue reading
 
Each year WRA works hard to advance our climate goals on the state level. In an increasingly uncertain federal environment, state level action is the key to seeing real change and progress on climate. WRA has been working at state legislatures all throughout 2025 to bring forward proactive policies that fight climate change and its impacts. We’ve a…
  continue reading
 
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
  continue reading
 
He’s notorious for causing one of the longest prison standoffs in U.S. history, and now Ricky Wassenaar is a confessed killer. In April 2025, three inmates were killed at a Tucson prison complex, and the sole suspect: Ricky Wassenaar. From prison, he calls True Crime Correspondent Briana Whitney and describes not only how he killed the other inmate…
  continue reading
 
Efficient orchestration and maintainability are crucial for data engineering at scale. Gil Reich, Data Developer for Data Science at Wix, shares how his team reduced code duplication, standardized pipelines, and improved Airflow task orchestration using a Python-based framework built within the data science team. In this episode, Gil explains how t…
  continue reading
 
This research paper introduces Anna, a key-value store (KVS) designed for scalable performance across diverse computing environments, from single multi-core machines to globally distributed cloud deployments. Anna achieves high performance and adaptability through a partitioned, multi-master architecture utilizing wait-free execution and coordinati…
  continue reading
 
Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
  continue reading
 
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
  continue reading
 
🔴 In this inspiring episode of the North Idaho Experience, we dive into the wild with Danny Cook — an adventure traveler, photographer, and content creator with over 37K followers on Instagram. Discover Danny’s journey from a small-town Idaho upbringing to scaling remote mountaintops and capturing jaw-dropping wilderness photography. From the hidde…
  continue reading
 
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
  continue reading
 
In this episode, we unpack the legendary role of the A-10 Warthog in the battlespace, the irreplaceable bond between pilots and JTACs, and the critical missions led by Air Force Combat Controllers. Col. Oaks shares insights from his time in the cockpit, what ordnance the A-10 can carry, when a show of force is necessary, and the lasting legacy of m…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play