Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Concise Software Podcasts

show episodes
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Need quick, actionable insights to sharpen your UX leadership and strategy? Short on time but eager to grow your influence? UX strategist Paul Boag delivers concise, practical episodes designed to enhance your strategic thinking, leadership skills, and impact in user experience. Each bite-sized podcast is just 6-10 minutes—perfect for busy UX leaders and advocates on the go.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
Concise Conversations

Concise Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Concise Conversation is a podcast where Bob Swift is talking with his guests about new technologies and their impact on the world we live in and for the future. Stay with us for a behind-the-scenes look at the world of new technology, explore exciting interviews with new-tech leaders, and subscribe to never miss new episodes!
  continue reading
 
Digital Dialogs - Compact conversations on the future of tech is an innovative podcast that aims to explore the cutting-edge frontiers of technology, with a special focus on emotional intelligence and human-computer interaction. Through a series of concise dialogues and expert insights from professionals, this podcast is a journey into how technology is not only advancing by leaps and bounds but also becoming increasingly sensitive and responsive to our emotions, thereby improving the qualit ...
  continue reading
 
Artwork

1
Cyber Daily News

Digital Pipelines

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Cyber Daily News is a fast, no nonsense cybersecurity podcast designed for professionals, builders, and anyone who wants to stay ahead of real world threats. Each episode delivers a concise breakdown of the most important cyber incidents, vulnerabilities, exploits, and security trends shaping the day. You will hear clear explanations of breaches, ransomware campaigns, zero day vulnerabilities, nation state activity, and major security advisories, without hype or filler. The focus is on what ...
  continue reading
 
Artwork
 
The Startup CEO Show hosted by coach and advisor Mark MacLeod, brings you veteran CEOs each week who have collectively had had billion dollar valuations, 9 figure exits, and millions in revenue each week. Subscribe to join the leading podcast produced exclusively for the CEOs of high-growth startups and the VCs who back them. This podcast offers concise, yet deep dives into specific themes within each episode, focusing on providing actionable insights for busy leaders. The format includes in ...
  continue reading
 
✨ Welcome to AI Insight Central Hub (AICHUB) ✨ Your ultimate destination for staying up-to-date with the world of artificial intelligence. Whether you're looking for in-depth analyses, quick updates, or expert reviews on the latest AI tools and gadgets, we’ve got you covered! 🔍 What to Expect: RoboRoundup: Dive deep every weekend into the biggest breakthroughs and most impactful AI trends. Each episode features expert insights, interviews, and thoughtful discussions designed to help you unde ...
  continue reading
 
The ERP & Data Management News Briefing delivers concise, actionable updates on the technologies, strategies, and players shaping enterprise resource planning and data management. Each episode distills the latest developments in software, cloud platforms, analytics, and governance—helping IT leaders, business analysts, and decision-makers stay ahead without wading through endless reports. From new vendor launches to emerging best practices in integration, security, and compliance, you’ll get ...
  continue reading
 
Artwork

1
The Reason Rundown With Peter Suderman

The Reason Rundown With Peter Suderman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Free minds. Free markets. Big stories. That's the Reason Rundown. End the week with concise, thought-provoking stories from the journalists at Reason, the magazine of logic, not legends; coherence, not contradictions. Hosted by Features Editor Peter Suderman, each week he talks to a single Reason journalist about a single big story.
  continue reading
 
Loading …
show series
 
Focusing on practical applications of machine learning (ML) within the Amazon Web Services ecosystem. The content systematically covers the exam syllabus, starting with ML fundamentals like modeling pipelines, supervised and unsupervised learning, and data splitting strategies to prevent overfitting and underfitting. It then details various AWS ser…
  continue reading
 
Cyber Daily News December 22, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- New Flaw in Somalia’s E-Visa System Exposes Travelers’ Passport Datahttps://thecyberexpress.com/somalia-e-visa-security-flaw-data-exposure/- Infy Returns: Iran-linked hacking group show…
  continue reading
 
Offers an extensive guide to implementing VXLAN BGP EVPN fabrics, focusing heavily on the spine-and-leaf architecture in data center networking. It details the logical and physical components necessary for fabric creation, including the configuration of the underlay network using protocols like OSPF and IS-IS, and establishing the overlay network w…
  continue reading
 
Cyber Daily News December 21, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Massive Android botnet Kimwolf infects millions, strikes with DDoShttps://securityaffairs.com/185921/malware/massive-android-botnet-kimwolf-infects-millions-strikes-with-ddos.html- ATM …
  continue reading
 
A comprehensive guide for designing and developing enterprise Python code. It covers a vast array of topics, including best practices for code structure and quality (e.g., commenting, naming conventions, and PEP 8), effective use of Python data structures (lists, dictionaries, sets, and tuples), and object-oriented programming concepts (classes, in…
  continue reading
 
Welcome to a deep dive into the most intense 25-day sequence in technology history, where the AI model race accelerated to "singularity speed" between November and December 2025. This podcast explores the unprecedented "chronological cascade" that saw xAI, Google, Anthropic, and OpenAI each release their most powerful models to date in rapid-fire s…
  continue reading
 
Cyber Daily News December 20, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Russia was behind a destructive cyber attack on a water utility in 2024, Denmark sayshttps://securityaffairs.com/185885/hacking/russia-was-behind-a-destructive-cyber-attack-on-a-water-u…
  continue reading
 
Detailing the configuration and use of Traefik as an API gateway in a microservices environment. The text explains the shift from monolithic to microservices architecture and the need for dynamic gateway solutions like Traefik, which offers features such as load balancing (Round Robin, Weighted Round Robin, Mirroring) for HTTP, TCP, and UDP traffic…
  continue reading
 
Cyber Daily News December 19, 2025Stories mentioned in today's briefing:- China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Managerhttps://securityaffairs.com/185861/apt/china-linked-apt-uat-9686-is-targeting-cisco-secure-email-gateway-and-secure-email-and-web-manager.html- Hewlett Packard Enterprise (HPE) f…
  continue reading
 
An extensive overview of systems analysis and design, primarily focusing on the tenth edition of a textbook on the subject, likely by Kendall and Kendall. The content comprehensively covers the phases of the systems development life cycle (SDLC), including project management techniques such as feasibility analysis, PERT diagrams, and various conver…
  continue reading
 
Cyber Daily News December 18, 2025Stories mentioned in today's briefing:- FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Launderinghttps://thecyberexpress.com/e-note-crypto-exchange-seized/- Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerabilityhttps://thecyberexpress.com/cisco-cve-2025-20393-secure-email-cyberatt…
  continue reading
 
A detailed overview of the various phases, concepts, and tools involved in the Systems Development Life Cycle (SDLC). The text covers organizational topics such as the role and required skills of a systems analyst, the structure of the IT department, and strategic planning, including cost-benefit analysis and feasibility studies. It extensively exp…
  continue reading
 
An extensive guide to computer hacking for beginners, detailing various types of hackers, including Black Hat, White Hat, and Grey Hat practitioners. It thoroughly explains the most popular hacking technique, social engineering, outlining different forms such as Phishing, Impersonation, Vishing, and Smishing, which exploit human vulnerabilities. Fu…
  continue reading
 
A comprehensive technical overview of synchronization and timing solutions within telecommunications, with a specific focus on 4G and 5G mobile networks. It explores the historical necessity of synchronization, progressing from frequency alignment for digital networks to the modern requirement for phase and time synchronization driven by mobile bas…
  continue reading
 
Join a community of ambitious CEOs who are looking to build market-leading companies without sacrificing health and happiness. Check out: https://limitless.ceo What happens when your “software startup” accidentally turns into an agency, and that mistake becomes the fuel for your next breakout company? In this episode, I sit down with Reza, founder …
  continue reading
 
An educational resource detailing statistical concepts foundational to machine learning, including descriptive statistics (mean, median, mode, and measures of dispersion), probability theory, and methods for parameter estimation and hypothesis testing. The book covers various analytical techniques such as ANOVA, regression models (linear, logistic,…
  continue reading
 
A comprehensive guide for learning iOS app development, starting with the fundamentals of the Swift programming language, including variables, control flow, and collections. The book thoroughly explains the use of Apple's development tools, such as Xcode and Playgrounds, and covers key application architecture concepts like Model-View-Controller (M…
  continue reading
 
This is the deep dive into the single biggest paradox in the global economy right now: the tension between AI exuberance and the reality of stock market downside. We analyze the colossal scale of the structural shift, driven by a truly historic $2.1 trillion in capital investment committed by mega cap tech firms, the "AI scalers" like Amazon, Alpha…
  continue reading
 
A book about building scalable data streaming solutions using various Amazon Web Services (AWS) tools, primarily focusing on the Amazon Kinesis family of services (Data Streams, Firehose, Data Analytics, and Video Streams). The content explains the core concepts of data streaming and distributed systems, detailing how to produce and consume data us…
  continue reading
 
Explores several critical areas concerning the security and privacy of online platforms. The chapters discuss privacy-preserving analytics techniques for social network data, including methods like k-anonymity and differential privacy, to protect user information from breaches such as the Cambridge Analytica incident. Several sections are dedicated…
  continue reading
 
Well, here we are. The UX Strategy and Leadership course has wrapped up, and I am officially putting down my digital pen until January 8th. I know. Try not to weep. 😭 Before I disappear into a haze of mince pies and questionable Christmas jumpers, I wanted to take a moment to say thank you. Genuinely. You read what I write, you tolerate my rambling…
  continue reading
 
An extensive overview of security in telecommunications networks, particularly focusing on cellular systems and their convergence with the Internet. The text first establishes core security concepts and cryptographic principles before thoroughly examining vulnerabilities in both traditional voice networks and modern cellular data services like GSM …
  continue reading
 
An extensive overview of enterprise security architecture, emphasizing a business-driven approach. It introduces the SABSA Model, a six-layer framework for developing security architectures, and explains how it guides the entire process from contextual business requirements to operational security. The text covers critical concepts like risk manage…
  continue reading
 
An extensive overview of digital literacy and technology, covering a broad range of topics from basic computer and smartphone functionality to advanced internet applications. It introduces fundamental concepts of hardware and software, then expands into practical usage of online services like email, social media, digital maps, and e-commerce. The t…
  continue reading
 
A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
  continue reading
 
A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
  continue reading
 
Welcome to The Deep Dive, your weekly briefing on the critical market shifts occurring in early December 2025. We explore the tense convergence of rapid technological acceleration and high-stakes financial urgency across two key sectors. The AI Race Redefined: The global battle for AI supremacy has pivoted from brute-force scaling toward architectu…
  continue reading
 
A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers detailed strategies for interview preparation, including how to approach problems, optimize solutions, and understand time and space complexity (Big O notation). The text provides interview-specific ad…
  continue reading
 
A comprehensive overview of computer networking principles and technologies. The text explores foundational concepts such as gateways, routers, and network layers, alongside detailed examples of various networks like the Internet (including ARPANET's history and evolution of traffic), mobile phone networks (1G-5G), and wireless LANs (IEEE 802.11). …
  continue reading
 
And so we've reached the end of the course on UX leadership and strategy (but not the end of my emails), and I want to leave you with some final thoughts and encouragement for the journey ahead. Being a design leader within an organization is challenging, and you will find yourself coming up against many roadblocks and difficulties along the way. I…
  continue reading
 
A practical guide for investigating computer crimes, focusing on methodologies and tools for digital evidence acquisition and analysis. The text covers a broad range of topics, including the basics of hard drives and storage media, various data hiding techniques like encryption and steganography, and the identification and handling of hostile code …
  continue reading
 
A comprehensive overview of penetration testing concepts and methodologies, covering various attack types and the tools used by security professionals. They detail social engineering techniques like phishing, vishing, smishing, and physical exploits such as dumpster diving and badge cloning. The sources also explore different penetration test scope…
  continue reading
 
Offers an in-depth look at the Certified Information Systems Auditor (CISA) certification. It covers critical aspects of information systems auditing, including processes, risk management, business resilience, and security controls, with a focus on preparing candidates for the CISA exam through key concepts and self-assessment questions. The text a…
  continue reading
 
Join a community of ambitious CEOs who are looking to build market-leading companies without sacrificing health and happiness. Check out: https://limitless.ceo What if the “boring” SaaS backup tool you rarely think about is actually a rocketship, and the CEO behind it refuses to sacrifice his marriage or his health to build it? In this episode, I s…
  continue reading
 
A preparation guide for Certified Ethical Hacker (CEH) certification, focusing on a wide array of cybersecurity topics. It covers fundamental concepts such as ethical hacking, vulnerabilities, and types of attacks, moving into practical methodologies like footprinting, network scanning, and enumeration. The guide also details various malicious soft…
  continue reading
 
Focusing on cybersecurity defense through the lens of offensive security. The material covers the evolution of cybersecurity practices, critiques the traditional passive and reactive defense posture, and advocates for an "Active Defender" mindset, which involves understanding and leveraging attacker methodologies, tools, and the hacker mentality. K…
  continue reading
 
Outlines a seven-step methodology for building an effective InfoSec program by focusing on the "art," or people side, of security. The author, Todd, draws on over two decades of experience to argue that success hinges on cultivating strong relationships and ensuring alignment with the company's risk tolerance, as most organizations are indifferent …
  continue reading
 
Are you walking around with a phone in your hand? Probably, are ready for the day when it gets grabbed and disappears. Aaran, Doug, and Josh talk about phone strategies on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-533…
  continue reading
 
Focusing heavily on the complexities of cloud governance, compliance, and auditing. A significant portion of the text is dedicated to the Cloud Controls Matrix (CCM), an industry-specific framework developed by the Cloud Security Alliance (CSA), which is used to assess security and compliance across various cloud service models like IaaS, PaaS, and…
  continue reading
 
This week, the AI industry stopped being a future technology and became national and corporate infrastructure. We break down the massive shift that marked the end of the "Chatbot Era" and the start of the "Agent Era" between November 22nd and 27th, 2025. The Technological Revolution: Google introduced Gemini 3 as a new "intelligence layer" woven ac…
  continue reading
 
Last week I talked about marketing UX within your organization and how you can use internal marketing strategies to build awareness and executive support. This week, I want to dig into a more hands-on approach: getting your stakeholders directly involved in UX activities. If all my talk about guerrilla marketing and PR stunts felt a bit overwhelmin…
  continue reading
 
Last week, I talked about building credibility by looking outside your organization for validation. External benchmarking, expert opinions, and industry recognition all help shift internal perception. But validation only works if people understand the actual value you're delivering. That brings us to today's topic: measuring and communicating UX su…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play