A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.
…
continue reading
Computer Forensics Podcasts
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
My Hard Drive Died - Podnutz
…
continue reading
Welcome Savage scholars . We have talks about music, philosophy, psychedelics, computer science, BJJ, psychology , working out and more!!!! Aka beastly savage talk for scholars
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
"The Edge AIsle" brings you to the forefront of artificial intelligence and edge computing, powered by Hailo.ai. In this podcast, we explore how edge AI is reshaping industries from smart cities and intelligent video analytics to autonomous vehicles and retail innovation. Join industry experts and thought leaders as they share insights into how Hailo’s AI processors are transforming the way industries function, enabling real-time deep learning and AI-driven applications directly on edge devi ...
…
continue reading
Aleksandra Zuraw from Digital Pathology Place discusses digital pathology from the basic concepts to the newest developments, including image analysis and artificial intelligence. She reviews scientific literature and together with her guests discusses the current industry and research digital pathology trends.
…
continue reading
For every Marie Curie or Rosalind Franklin whose story has been told, hundreds of female scientists remain unknown to the public at large. In this series, we illuminate the lives and work of a diverse array of groundbreaking scientists who, because of time, place and gender, have gone largely unrecognized. Each season we focus on a different scientist, putting her narrative into context, explaining not just the science but also the social and historical conditions in which she lived and work ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
4
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops
The Lead Tech Podcast | The Talk Show For Electronics Repair Shops
Do you want to take your repair shop to the next level? Our owners helped grow some of the largest repair shops in the southeast including The Computer Warriors, Mr. Phix, Mobile Zone, and Smart Touch Repair Center. The Lead Tech Podcast aims to help you expand your offerings to data recovery, forensics, networking, board-level repair, and to deliver an unbelievable customer service experience. Become the largest repair shop in town and gain the competitive advantage.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Join hosts Debbie Dujanovic, Sheryl Worsley and Becky Bruce in a virtual citizens' academy with the FBI in Salt Lake City, Utah. Learn about how agents respond to crimes and threats ranging from human sex trafficking to counterterrorism and intelligence to mass shootings and even the mafia. Take a virtual tour of the technology used by the evidence response teams that help process crime scenes and work your way through the firearms training simulator as agents explain how and why to use dead ...
…
continue reading
1
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence
28:41
28:41
Play later
Play later
Lists
Like
Liked
28:41A detailed guide for aspiring and experienced digital forensic investigators, covering a broad spectrum of topics essential to the field. It begins by introducing various types of computer-based investigations, from criminal to corporate, and then explains the meticulous forensic analysis process, including workstation setup, software, and evidence…
…
continue reading
1
Linux+ and LPIC-1 Guide to Linux Certification, Loose-leaf Version (MindTap Course List)
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28A comprehensive guide to Linux, focusing on certification and practical administration. It covers fundamental Linux concepts like filesystems, shell commands, and process management, alongside advanced topics such as network configuration, server deployment, and cloud technologies. The text also addresses security, troubleshooting, and performance …
…
continue reading
1
CCNAv7: Introduction to Networks Companion Guide by Cisco
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52An official textbook for individuals pursuing careers in network administration or seeking to enhance their professional knowledge. The book comprehensively covers fundamental networking concepts, beginning with an overview of network types, topologies, and basic connectivity, and progressing to detailed explanations of protocols and models like TC…
…
continue reading
1
From Wins to Wishlists: Digital Forensics Year in Review
1:22:10
1:22:10
Play later
Play later
Lists
Like
Liked
1:22:10Send us a text A blue jay, a busted feeder, and a brand-new camera set the tone, but only briefly. We kick off the new year with updates from the Florida ICAC conference, including firsthand courtroom experience watching frame rate and frame count testimony in action. The episode centers on Frame Counts Galore, an open-source script for extracting …
…
continue reading
1
Forensic Focus International Well-Being Study - Have Your Say
52:48
52:48
Play later
Play later
Lists
Like
Liked
52:48Phil Anderson from Northumbria University joins the Forensic Focus Podcast to discuss the launch of the Forensic Focus International Well-Being Study — a global research project examining the psychological and physical impact of digital forensic work across both law enforcement and the private sector. Drawing on his 24-year academic career and long…
…
continue reading
1
Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47A rigorous, introductory treatment of modern cryptography, focusing on definitions, precise assumptions, and proofs of security as distinguishing features from classical cryptography. It explores private-key encryption in depth, covering concepts like chosen-plaintext attacks (CPA-security) and chosen-ciphertext attacks (CCA-security), along with p…
…
continue reading
1
Introduction to Compiler Construction in a Java World
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50A hands-on introduction to compiler construction, emphasizing Java technology and software engineering principles. It guides readers through the process of building and extending a real, functional Java compiler for a Java subset called "j--". The material covers fundamental compiler phases, including lexical analysis (scanning), parsing (syntax-di…
…
continue reading
1
Hands-On Python Deep Learning for the Web: Integrating neural network architectures to build smart web apps with Flask, Django
18:27
18:27
Play later
Play later
Lists
Like
Liked
18:27A comprehensive guide to deep learning for web development, specifically with Python. It covers the foundational concepts of machine learning and neural networks, including various types like CNNs and RNNs, and essential terminology such as bias, variance, overfitting, and underfitting. The sources provide practical instruction on building and depl…
…
continue reading
1
Windows Mastery for A+ Techs | CompTIA Exam Tips & Tech Exam Prep
26:33
26:33
Play later
Play later
Lists
Like
Liked
26:33[email protected] Preparing for the CompTIA A+ Core 2 exam requires more than just chasing icons—it demands a deep understanding of how Windows truly works. In this episode, we explore the technician mindset that transforms scattered Windows settings into a navigable system you can confidently manage under exam pressure. Whether you're part o…
…
continue reading
[email protected] In this episode of Technology Tap: CompTIA Study Guide, we explore a groundbreaking shift in cybersecurity threats focused on operational availability instead of data theft. Using five headline patterns from 2025, including a case where hospital scheduling systems were compromised, we highlight critical lessons for IT skills…
…
continue reading
1
Hacklog Volume 2 Web Hacking: Manuale sulla Sicurezza Informatica e Hacking Etico
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13A detailed guide to web hacking, IT security, and ethical hacking practices. It systematically explores a wide array of vulnerabilities and attack methodologies common to web applications, alongside corresponding defense techniques. The document is structured to educate readers on fundamental web technologies, popular hacking tools, and practical l…
…
continue reading
1
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37Functions as an all-in-one exam guide for the GPEN certification, covering essential penetration testing methodologies and tools. It includes detailed chapters on reconnaissance, initial access, execution, and reporting, with specific sections dedicated to the Metasploit Framework and PowerShell Empire. The guide emphasizes practical application th…
…
continue reading
1
RxJS Cookbook for Reactive Programming: Discover 40+ real-world solutions for building async, event-driven web apps
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03A practical guide for intermediate-to-advanced JavaScript developers. It focuses on using the RxJS library to build asynchronous, event-driven web applications, particularly with Angular and NestJS. The book provides numerous real-world solutions and recipes covering topics like error and side effect handling, UI building, performance optimization,…
…
continue reading
1
React Key Concepts: An in-depth guide to React's core features
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02A practical resource for web developers looking to deepen their understanding of React. Authored by Maximilian Schwarzmüller, a prominent online instructor, the book covers a wide array of topics crucial for building modern user interfaces, including components, JSX, state management, event handling, styling, routing with React Router, and advanced…
…
continue reading
Explores the multifaceted world of interacting with and optimizing large language models (LLMs) and generative AI for both text and image creation. It covers fundamental prompt engineering principles, such as giving clear instructions, specifying output formats, and providing examples, alongside advanced techniques like text style unbundling and ta…
…
continue reading
[email protected] What if the scariest hacks of 2025 never looked like hacks at all? We break down five real-world scenarios where attackers didn’t smash locks—they used the keys we handed them. From an AI-cloned voice that sailed through a wire transfer to a building’s HVAC console that quietly held elevators and doors hostage, the common th…
…
continue reading
Send us a text What really changed in digital pathology this year—and what still needs work? As we close out 2025 and step into 2026, I wanted to pause, reflect, and share what I’ve seen shift from theory to real-world practice across labs, conferences, and clinical workflows. I look back at the most meaningful developments in digital pathology and…
…
continue reading
1
C++20 Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58A quick syntax reference for C++20, offering a comprehensive overview of the language's core features and functionalities. It covers fundamental programming concepts such as variables, data types, operators, and control flow (loops and conditionals). The text also explores object-oriented programming principles including classes, constructors, inhe…
…
continue reading
1
F is for the Final Piece - Breaking a Case Wide Open
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00In the final episode of the year, we bring everything together—file systems, memory, timelines, flash storage, and user activity—to show how real digital cases are solved from start to finish. This episode walks through how a single overlooked artifact can become the final piece that breaks a case wide open. We also reflect on the season and tease …
…
continue reading
1
Building Web Apps with Python and Flask: Learn to Develop and Deploy Responsive RESTful Web Applications Using Flask Framework
20:15
20:15
Play later
Play later
Lists
Like
Liked
20:15A practical guide for developing and deploying responsive, RESTful web applications using the Flask framework. The book covers fundamental concepts of web application development, starting with Python for CGI and the Web Server Gateway Interface (WSGI), before moving into the Flask framework and its dependencies like Werkzeug, Jinja2, and Click. It…
…
continue reading
1
Napster Changed Everything: How Technology Transformed Music and Tech Education
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40[email protected] Explore how Napster revolutionized technology education by changing the way we interact with digital files and access information. This episode delves into the transformation from physical media to digital packets, illustrating key moments that reshaped internet culture and technology. Whether you're preparing for your CompT…
…
continue reading
1
Building Machine Learning Systems Using Python: Practice to Train Predictive Models and Analyze Machine Learning Results with Real Use-Cases
23:17
23:17
Play later
Play later
Lists
Like
Liked
23:17A comprehensive educational resource for understanding foundational machine learning concepts. The text introduces readers to the principles and applications of machine learning, categorizing different learning approaches such as supervised, unsupervised, and reinforcement learning. It then explores various algorithms, including linear and logistic…
…
continue reading
1
Building Enterprise Blockchain Solutions on AWS: A Developer's Guide to Build, Deploy, and Managed Apps Using Ethereum, Hyperledger Fabric
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Focuses on creating, deploying, and managing blockchain applications on Amazon Web Services (AWS). The text explores foundational blockchain concepts, contrasting them with traditional centralized systems and highlighting benefits like immutability and decentralization. It provides practical instruction on utilizing AWS Managed Blockchain, AWS Bloc…
…
continue reading
1
Building Decentralized Blockchain Applications: Learn How to Use Blockchain as the Foundation for Next-Gen Apps
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11A comprehensive guide to understanding and developing applications using blockchain technology. The book covers fundamental blockchain concepts, including its history, core components, and various consensus mechanisms like Proof of Work and Proof of Stake. It further explores key platforms like Bitcoin and Ethereum, detailing their architecture, tr…
…
continue reading
1
Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12A guide for white-hat hackers participating in bug bounty programs. It covers fundamental concepts like bug bounty platforms, methodologies, and the process of reporting vulnerabilities effectively. The text explores various common web application vulnerabilities in detail, including Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), SQ…
…
continue reading
In this Edge AIsle episode, we summarize the key insights from Hailo edge AI’s blog Bringing Generative AI to the Edge: LLM on Hailo-10H. As generative AI continues to reshape industries, Large Language Models are becoming increasingly powerful, but also increasingly demanding in terms of compute, memory, and cost. This episode explains why traditi…
…
continue reading
1
Blockchain in e-Governance: Driving the next Frontier in G2C Services
18:18
18:18
Play later
Play later
Lists
Like
Liked
18:18Explores the transformative potential of Blockchain technology, particularly in e-governance and various enterprise applications. It begins by detailing the foundational concepts of Blockchain, including its cryptographic principles, consensus mechanisms, and different platform types like Ethereum and Hyperledger Fabric. The document then highlight…
…
continue reading
1
Beginning Java MVC 1.0: Model View Controller Development to Build Web, Cloud, and Microservices Applications
19:52
19:52
Play later
Play later
Lists
Like
Liked
19:52A comprehensive guide for developing web, cloud, and microservices applications using Java MVC. It introduces the fundamental Model-View-Controller (MVC) design pattern, tracing its history and adaptation for web applications, especially within the Java EE/Jakarta EE ecosystem utilizing JSR-371. The text covers practical aspects of setting up a dev…
…
continue reading
1
Inside the Cambridge Analytica Scandal: Technology Ethics and Data Privacy
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51[email protected] In this episode of Technology Tap: CompTIA Study Guide, my students dive into the notorious Cambridge Analytica scandal and its profound impact on data privacy and technology ethics. Our students break down how seemingly harmless personality quizzes exploited Facebook data, creating psychological profiles that influenced ele…
…
continue reading
1
F is for Flash Storage – Evidence in the Modern Drive
42:33
42:33
Play later
Play later
Lists
Like
Liked
42:33In this episode, we break down the challenges and opportunities of flash storage forensics. From SSDs and USB drives to smartphones, learn how wear leveling, TRIM commands, and encryption impact evidence recovery—and why “deleted” doesn’t always mean gone. Real-world cases and practical techniques show how investigators adapt in the modern storage …
…
continue reading
1
AWS Certified Machine Learning Specialty: MLS-C01 Certification Guide: The definitive guide to passing the MLS-C01 exam on the very first
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Focusing on practical applications of machine learning (ML) within the Amazon Web Services ecosystem. The content systematically covers the exam syllabus, starting with ML fundamentals like modeling pipelines, supervised and unsupervised learning, and data splitting strategies to prevent overfitting and underfitting. It then details various AWS ser…
…
continue reading
Si and Desi close out the year on the Forensic Focus Podcast with a wide-ranging end-of-2025 wrap-up, reflecting on how the year unfolded for the show and the DFIR community. They discuss the mental health series, guest appearances, and how everyday technologies — from streaming services to wearables — are increasingly intersecting with forensic in…
…
continue reading
1
The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
…
continue reading
1
Netscape, Mosaic, and the Dawn of the Browser Wars – Technology Education History
29:43
29:43
Play later
Play later
Lists
Like
Liked
29:43[email protected] Explore the pivotal moment in technology education as we trace the origins of the internet browser from Mosaic’s innovation at NCSA to Netscape Navigator's rise as the gateway to the web. This episode dives deep into internet history, highlighting the major players like Jim Clark and Marc Andreessen who shaped the early web …
…
continue reading
1
The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise
10:43
10:43
Play later
Play later
Lists
Like
Liked
10:43A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
…
continue reading
1
Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
…
continue reading
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
…
continue reading
1
Incident Response and Forensics Essentials | CompTIA Security Exam Prep
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58[email protected] In this episode of Technology Tap: CompTIA Study Guide, we dive deep into incident response, forensics, and monitoring essentials crucial for your tech exam prep. Learn the full incident response lifecycle—preparation, detection, analysis, containment, eradication, recovery, and lessons learned—to develop your IT skills and …
…
continue reading
1
Oxygen Forensics On Smarter, Faster Remote DFIR Collections
1:07:16
1:07:16
Play later
Play later
Lists
Like
Liked
1:07:16Keith Lockhart from Oxygen Forensics joins Si and Desi on the Forensic Focus Podcast to examine how remote digital evidence collection is changing investigative workflows across DFIR, eDiscovery, and corporate investigations. Drawing on recent XiB mobile training and real-world deployments, Keith explains where remote and agent-based acquisition de…
…
continue reading
1
Loose Leaf for Systems Analysis and Design
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
…
continue reading
1
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
…
continue reading
1
179: How is the BigPicture Project using Foundation Models and AI in Computational Pathology?
1:06:23
1:06:23
Play later
Play later
Lists
Like
Liked
1:06:23Send us a text What if the biggest breakthrough in pathology AI isn’t a new algorithm—but finally sharing the data we already have? In this episode, I’m joined by Jeroen van der Laak and Julie Boisclair from the IMI BigPicture consortium, a European public-private initiative building one of the world’s largest digital pathology image repositories. …
…
continue reading
1
F is for Fragments in Time - Building Forensic Timelines
34:31
34:31
Play later
Play later
Lists
Like
Liked
34:31In this episode of F for Forensics, we explore how investigators transform scattered artifacts into a clear digital narrative using forensic timelines. From MACB timestamps and registry entries to browser data, logs, and super timelines, this episode breaks down how timelines reveal patterns, expose anomalies, and connect user actions across system…
…
continue reading
1
Help Desk Mastery: IT Support Best Practices & SOPs
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46[email protected] What if your help desk could solve recurring IT problems in minutes, not hours? In this episode, we explore the backbone of reliable IT support, focusing on clear SOPs that remove guesswork, SLAs that align technical work with business risk, and an effective ticketing flow that transforms scattered fixes into measurable outc…
…
continue reading
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
…
continue reading
1
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
15:00
15:00
Play later
Play later
Lists
Like
Liked
15:00An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
…
continue reading
1
From Sputnik to Smartphones: A Journey Through Technology Education and IT Skills Development
28:32
28:32
Play later
Play later
Lists
Like
Liked
28:32[email protected] In this episode of Technology Tap: CompTIA Study Guide, we explore the fascinating evolution of technology from the launch of Sputnik in 1957 to the ubiquitous smartphones of today. Discover how early innovations like ARPANET laid the groundwork for the internet, shaping the landscape of technology education and IT skills de…
…
continue reading
1
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
18:00
18:00
Play later
Play later
Lists
Like
Liked
18:00A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
…
continue reading
1
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
…
continue reading
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
…
continue reading