Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Cryptography Podcasts
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Signaling Theory cuts through crypto’s noise to find the real signals. Host Rex Kirshner joins builders, thinkers, and researchers who are shaping the space for deep, nuanced and informed conversations. Curiosity first, signal over noise.
…
continue reading
Story
…
continue reading
Intellectually Curious is a podcast by Mike Breault featuring over 1,600 AI-powered explorations across science, mathematics, philosophy, and personal growth. Each short-form episode is generated, refined, and published with the help of large language models—turning curiosity into an ongoing audio encyclopedia. Designed for anyone who loves learning, it offers quick dives into everything from combinatorics and cryptography to systems thinking and psychology. Inspiration for this podcast: "Mu ...
…
continue reading
The a16z crypto podcast is about the next generation of the internet, and about how builders and users — whether artists, coders, creators, developers, companies, organizations, or communities — now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. From ...
…
continue reading
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
…
continue reading
PowerShell Community
…
continue reading
Welcome to Cypherpunk’d, where we explore the intersection of privacy, technology, and personal freedom in the digital age. Hosted by Matty Ice, this podcast delves into the challenges posed by government surveillance and big tech’s intrusion into our lives. We bring you thought-provoking conversations with thought leaders, authors, computer scientists, Bitcoiners, entrepreneurs, and human rights activists who are at the forefront of the digital resistance. Each episode cuts through the nois ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Zero Knowledge is a podcast which goes deep into the tech that will power the emerging decentralised web and the community building this. Covering the latest in zero knowledge research and applications, the open web as well as future technologies and paradigms that promise to change the way we interact — and transact — with one another online. Zero Knowledge is hosted by Anna Rose Follow the show at @ZeroKnowledgefm (https://twitter.com/zeroknowledgefm) or @AnnaRRose (https://twitter.com/Ann ...
…
continue reading
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
…
continue reading
The official podcast of the Satoshi Nakamoto Institute
…
continue reading
Conversations with Web3 builders about what they're working on right now. Topics include: Ethereum, EVM, Solidity, blockchain programming and indexing, L2 scaling solutions, zero knowledge, multi-party computation, cryptography, NFTs, crowdfunding, blockchain art, onchain performance art, and building networks and community. Subscribe with your favorite podcast app https://web3galaxybrain.com
…
continue reading
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics! RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Applications of Quantum Computing 1. Cryptography Quantum computers have the potential to break traditional encryption methods, prompting the development of quantum-resistant cryptographic algorithms. 2. Optimization Quantum computing excels in solving complex optimization problems, such as logistics, supply chain management, and financial modeling. https://kek.co/product/buy-youtube-views/
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
Welcome to Tech 'n Savvy! April is a software engineer, and Emily is a quantum computing and cryptography consultant. Listen in as we explore topics in technology and global issues important to us.
…
continue reading
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
…
continue reading
Close your eyes and let the universe unfold. Sleep with Science is a nightly invitation to explore the quiet wonder of the natural world. Through calm, unhurried narration, we transform complex scientific ideas into soothing stories that ease your mind and spark gentle curiosity. From the vast patterns of astronomy to the elegant code of DNA, each episode offers a soft passage into topics like physics, biology, geology, helping you learn while you unwind. Perfect for thoughtful minds and res ...
…
continue reading
A podcast hosted by Blockchain Israel, the largest community in Israel dedicated to Blockchain Solutions and Crypto Technologies. We'll be bringing thought leaders across industries to hear about their insights and input on how blockchain and crypto and its potential to disrupt industries. Our featured topics: Blockchain · Bitcoin · Cryptocurrency · Smart Contracts · Digital Currency · Virtual Currency · Decentralization · Cryptography · Decentralized Systems · Smart Property
…
continue reading
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
What does quantum physics tell us about reality? What progress have we made since the days of Einstein and Schrödinger, and what problems are today’s quantum research scientists trying to solve? This podcast aims to share a modern perspective on the most fundamental aspects of quantum theory, informed by up-to-date research insights. In each episode, I interview an active researcher about a topic related to their work, with the discussion aimed to be broadly accessible.
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
🎙️ In The Clouds: The First d/acc Podcast Exploring the intersection of technology, human agency, and our collective future through the lens of defensive accelerationism (d/acc). Join Hunter and Sam as we dive deep into emerging technologies, digital sovereignty, and how we can preserve human agency while embracing technological progress. 🔍 We cover: - AI and superintelligence - Digital sovereignty - Brain-computer interfaces - Cryptography and privacy - Decentralized systems - Cybernetics a ...
…
continue reading
1
en clair: forensic linguistics, literary detection, language mysteries, and more
Dr Claire Hardaker
en clair is a podcast about forensic linguistics, literary detection, language mysteries, cryptography, codes, language and the law, linguistic crime, undeciphered languages, and more, from past to present. Credits, links, podcast transcripts and more in the Case Notes: wp.lancs.ac.uk/enclair
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
The PowerShell Podcast is a weekly show about building your career with PowerShell. Each episode features the tips, tech, and modules that make PowerShell the premier automation and scripting tool for IT professionals. Join us as we interview PowerShell experts to discover what makes PowerShell and its community so amazing and awesome.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Podcast about science in Luxembourg and beyond - in every episode we have a look at the latest scientific research and technological changes in Luxembourg or we discuss it with scientists or researchers working in Luxembourg. This is a podcast for people who love science, but aren't necessarily science graduates. We post a new episode every second week.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
1
World-leaders in Cryptography: Kenny Paterson
1:46:03
1:46:03
Play later
Play later
Lists
Like
Liked
1:46:03Kenny is a professor in the Department of Computer Science at ETH Zurich, where he leads the Applied Cryptography Group. He was previously a professor in the Information Security Group at Royal Holloway, University of London. He served as co-chair of the IRTF's research group on Cryptography, CFRG, from 2014 to 2019 and as the Editor-in-Chief for t…
…
continue reading
1
The End of Static Cryptography: What Leaders Must Understand Now
20:47
20:47
Play later
Play later
Lists
Like
Liked
20:47Post-quantum cryptography does not arrive as a clean replacement for today’s systems. It forces organizations to rethink how cryptography is designed, deployed, governed, and maintained over time. In this special episode of Shielded, host Jo Lintzen leads a discussion that moves past algorithm selection and into operational reality. The panel conne…
…
continue reading
1
Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47A rigorous, introductory treatment of modern cryptography, focusing on definitions, precise assumptions, and proofs of security as distinguishing features from classical cryptography. It explores private-key encryption in depth, covering concepts like chosen-plaintext attacks (CPA-security) and chosen-ciphertext attacks (CCA-security), along with p…
…
continue reading
1
The IACR Can't Decrypt with Matt Bernhard
56:49
56:49
Play later
Play later
Lists
Like
Liked
56:49The International Association of Cryptologic Research held their regular election using secure voting software called Helios…and lost the keys to decrypt the results, leaving them with no choice but to throw out the vote and call a new election. Hilarity ensues. We welcome special guest Matt Bernhard who actually works on secure voting systems to e…
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
…
continue reading
1
Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
…
continue reading
1
3553: How Coralogix is Turning Observability Data Into Real Business Impact
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59What happens when engineering teams can finally see the business impact of every technical decision they make? In this episode of Tech Talks Daily, I sat down with Chris Cooney, Director of Advocacy at Coralogix, to unpack why observability is no longer just an engineering concern, but a strategic lever for the entire business. Chris joined me fres…
…
continue reading
A journey from Prince Rupert’s late‑17th‑century bet to a 2025 breakthrough that ends the Rupert conjecture. We explore how Jakob Steininger and Sergey Yurkevich designed the Noperthedron—an ornate 152‑faced shape engineered to fail the Rupert test—and how, by partitioning orientation space into about 18 million regions and applying a global and a …
…
continue reading
1
Winged Endurance: Navigating the World’s Longest Migrations
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02From the Arctic Tern’s 90,000 km yearly chase of endless summer to the bar-tailed godwit’s 11,000 km nonstop Pacific crossing, and the northern weeder’s 18,000-mile transcontinental hop, plus the shearwaters’ vast 40,000-mile circuits, this episode dives into how these birds push the limits of endurance and master navigation. We explore the physiol…
…
continue reading
1
Chautauqua: The Circuits That Brought Culture to America's Doorstep
4:26
4:26
Play later
Play later
Lists
Like
Liked
4:26Trace the Chautauqua movement from its 1874 beginnings at Chautauqua Lake to the traveling tent circuits that reached tens of millions. Explore how lectures, music, and reform debates turned rural America into a national classroom—and why the idea of accessible, high‑quality education still shapes public culture today. Note: This podcast was AI-gen…
…
continue reading
1
LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-500 and Exam 102-500
19:14
19:14
Play later
Play later
Lists
Like
Liked
19:14Offers an in-depth resource for individuals preparing for the LPIC-1 certification exam. The text covers a wide array of Linux system administration topics, including command-line tools, file management, software and process administration, hardware configuration, boot processes, graphical user interfaces (GUIs), user and group management, email an…
…
continue reading
1
3552: How CI&T Is Turning AI Ambition Into Measurable Business Results
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29What does real AI transformation look like when leaders stop chasing prototypes and start demanding outcomes they can actually measure? That question sat at the center of my conversation with Alex Cross, Chief Technology Officer for EMEA at CI&T, alongside Melissa Smith, as we unpacked why so many organizations feel stuck between AI ambition and bu…
…
continue reading
1
Rivers as Fractals: The Hidden Blueprint of Drainage Networks
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09We uncover how river networks are not random but self-organizing, guided by scale-invariant math. We'll explore Hack's Law and Horton’s laws, the bifurcation ratio, and how fractal geometry defines the network's complexity, while stream power explains how rivers carve their channels. We'll also discuss the surprising log-normal width of headwater s…
…
continue reading
1
Deflation: Knut Svanholm | Everything Divided By 21 Million | Episode 9 of 12
18:45
18:45
Play later
Play later
Lists
Like
Liked
18:45Is everything you’ve been told about deflation a lie? In Episode 9 of our 12-part series on the groundbreaking book "Everything Divided By 21 Million," we sit down with legendary Bitcoin philosopher Knut Svanholm to dismantle the "government daycare" version of economics. We dive deep into why deflation is the natural state of a free market, why th…
…
continue reading
1
Gamma Rays: The Universe’s Most Penetrating Light
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47From the first discoveries to the cosmos’ most energetic events, this deep dive follows gamma rays from their nuclear origins and vast energy range (roughly 10 keV up to beyond 10^11 keV) to how we harness them on Earth. We explore their roles in pulsars and gamma-ray bursts, how scientists shield against their penetrating power, and the lifesaving…
…
continue reading
1
NB557: Meta Goes Nuclear; Arista Taps EVPN VXLAN for Massive Mobility Domains
28:35
28:35
Play later
Play later
Lists
Like
Liked
28:35Take a Network Break! The virtual donut factory is back from hiatus, and we’ve got a fresh batch to pass around as we discuss the week’s tech news. We start with an emergency patch for Cisco ISE, then dig into a set of new product announcements from Arista including a new ability to deploy wireless... Read more »…
…
continue reading
https://mcdn.podbean.com/mf/web/rut8gqkunha2xsvu/The_PowerShell_Podcast_episode_209_Matthew_Gillajwsp.mp3 Matthew Gill joins The PowerShell Podcast to talk about what it means to be a Site Reliability Engineer (SRE) and how SRE thinking changes the way you approach automation, reliability, and problem solving. Matthew and host Andrew Pla break down…
…
continue reading
1
Reliability Through Planning with Matthew Gill
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56Matthew Gill joins The PowerShell Podcast to talk about what it means to be a Site Reliability Engineer (SRE) and how SRE thinking changes the way you approach automation, reliability, and problem solving. Matthew and host Andrew Pla break down core concepts like SLAs, SLOs, and SLIs, and why reliability through planning matters more than rushing s…
…
continue reading
1
Fractal Flavor: The Recursive Science of Deep Cooking
4:29
4:29
Play later
Play later
Lists
Like
Liked
4:29A journey from Maillard chemistry to terroir, exploring how culinary depth emerges from simple patterns repeated across scales. We explain why the elusive 'middle-ground' matrix—multi-step breakdown products—must develop slowly, and why industrial shortcuts often miss it. The episode also surveys how regenerative farming and AI-driven modeling are …
…
continue reading
1
LPIC-1 Linux Professional Institute Certification Practice Tests: Exam 101-500 and Exam 102-500
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44Provides practice tests and study material for the LPIC-1 Linux Professional Institute Certification, specifically addressing exams 101-500 and 102-500. It covers a wide range of Linux system administration topics, including system architecture, installation and package management, GNU and UNIX commands, filesystems and device management, shell scr…
…
continue reading
1
3551: AI That Delivers at Scale: Inside HGS and Real Business Transformation
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16What does AI-led transformation actually look like when it moves beyond pilots, hype, and slide decks and starts changing how work gets done every day? That question framed my conversation with Venk Korla, CEO of HGS, at a time when many organizations feel both excited and exhausted by AI. Boards want results, teams are buried in proofs of concept,…
…
continue reading
1
Cosmic Platypuses: JWST’s Ultra-Compact High-Redshift Galaxies Redefine Dawn Galaxies
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Nine ultra-compact galaxies from the universe’s first billion years—identified by Hao Jin Yang and collaborators in archival JWST data—appear as tiny point sources at redshift ~12–12.6, yet their narrow emission lines and Milky Way–scale energy output defy the traditional quasar picture. Dubbed the “cosmic platypuses,” these objects hint at a previ…
…
continue reading
1
Special Guest Xenu + Price, News, and More! | EPI 247
3:16:11
3:16:11
Play later
Play later
Lists
Like
Liked
3:16:1147e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate GUEST LINKS: https://x.com/xenumonero TIMESTAMPS (00:00:00) Monerotopia Introduction. (00:16:12) Monerotopia Guest Segment w/ Xenu. (01:07:10) Monerotopia Price Report Segment w/ Bawdyanarchist. (02:00:0…
…
continue reading
1
3550: Signos and the Case for Seeing Your Metabolism in Real Time
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22What if the biggest breakthrough in weight management is not a new diet, but finally seeing how your body responds in real time? That question sat at the center of my conversation with Sharam Fouladgar-Mercer, CEO and co-founder of Signos, a continuous glucose monitoring (CGM) and AI-powered health platform built to help people manage weight by und…
…
continue reading
1
Helicoprion: The Spiral Saw of the Permian Seas
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38We unravel Helicoprion, the Permian cartilaginous fish whose jaw formed a circular saw. For a century scientists misidentified the spiral tooth-whorl. A pivotal Idaho 4 specimen with preserved jaw cartilage and 2013 CT scans finally revealed the saw tucked inside the lower jaw, a self-sharpening bite-feeder that sliced soft prey and crushed shells.…
…
continue reading
1
Linux+ and LPIC-1 Guide to Linux Certification, Loose-leaf Version (MindTap Course List)
25:28
25:28
Play later
Play later
Lists
Like
Liked
25:28A comprehensive guide to Linux, focusing on certification and practical administration. It covers fundamental Linux concepts like filesystems, shell commands, and process management, alongside advanced topics such as network configuration, server deployment, and cloud technologies. The text also addresses security, troubleshooting, and performance …
…
continue reading
1
3549: Moonshot AI and the Rise of Self-Optimizing Websites
27:25
27:25
Play later
Play later
Lists
Like
Liked
27:25What if your website could spot its own problems, fix them, and quietly make more money while you focus on building your business? That question sat at the heart of my conversation with Aviv Frenkel, co-founder and CEO of Moonshot AI, and it speaks to a frustration almost every founder and digital leader recognizes. Traffic is expensive, attention …
…
continue reading
1
Miocene: The World Rewired—Tectonics, Climate, and the Rise of Modern Life
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09From 23 to 5 million years ago, the Miocene rewired Earth. Himalayan–Tibetan uplift reshaped climate and monsoons; Africa–Arabia sutured to Eurasia, enabling massive faunal exchanges; Antarctica's isolation launched the circumpolar current and long-term cooling. Global drying and cooling spurred grasslands, drove mammal diversification, and fostere…
…
continue reading
1
The Threat WITHIN | Psychological Cybersecurity
48:29
48:29
Play later
Play later
Lists
Like
Liked
48:29What if the biggest performance risk in your company isn’t burnout, AI disruption, or digital overload… but your subconscious operating system? In this deep-dive conversation, we sit down with internationally recognized behavioral health expert and leadership strategist David Kingsbury, LPCC-S, LCADC, NCC, ICAADC to uncover the hidden identity-leve…
…
continue reading
1
Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works
48:46
48:46
Play later
Play later
Lists
Like
Liked
48:46Why modern cybercrime targets trust, urgency, and decision-making instead of systems Deepfake Attacks, Voice Cloning, and Why AI Social Engineering Works Traditional fraud used to feel obvious: misspellings, odd links, weird emails. Now? Deepfakes embed perfectly familiar voices and faces into your feed — or your inbox. Listen to Perry Carpenter on…
…
continue reading
1
The Milky Way to Compostela: The Camino de Santiago’s Long Road Through History
4:09
4:09
Play later
Play later
Lists
Like
Liked
4:09Trace the Camino de Santiago—from a Roman trade route to a 9th‑century pilgrimage and a modern global quest for purpose. We’ll uncover the scallop shell’s symbolism, the Codex Calixtinus as a medieval travel guide, and the credencial that earns the Compostela, plus how hospitable networks helped birth today’s hospital system. From Sarria to Santiag…
…
continue reading
1
Peano Axioms Unpacked: Zero, Successor, and the Logic of Counting
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A concise tour of the axioms that ground the natural numbers. We explore zero, the successor function, and induction, show how addition is defined recursively, and glimpse the deep questions about consistency and the existence of non-standard models in first-order logic. Note: This podcast was AI-generated, and sometimes AI can make mistakes. Pleas…
…
continue reading
1
3548: Logility and the AI Compass for Supply Chain Leaders
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46What happens when decades of supply chain planning collide with AI, volatility, and a world that no longer moves at a predictable pace? That question sat at the heart of my conversation with Piet Buyck, a serial entrepreneur whose career spans early optimization engines, cloud-era planning systems, and now AI-driven decision environments. Speaking …
…
continue reading
1
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence
28:41
28:41
Play later
Play later
Lists
Like
Liked
28:41A detailed guide for aspiring and experienced digital forensic investigators, covering a broad spectrum of topics essential to the field. It begins by introducing various types of computer-based investigations, from criminal to corporate, and then explains the meticulous forensic analysis process, including workstation setup, software, and evidence…
…
continue reading
1
Aaluxx of Maya Protocol on Decentralized Swaps & Untraceable Digital Cash | EPI 375
50:57
50:57
Play later
Play later
Lists
Like
Liked
50:57Any donation is greatly appreciated! 47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate TODAY'S SHOW: In this episode of Monero Talk, Douglas Tuman interviews Aaluxx, co-founder of Maya Protocol, about cross-chain decentralized exchange technology, token…
…
continue reading
A classic rope puzzle that seems simple unlocks a doorway to the foundations of mathematics. We trace how lighting two ends and timing the second fuse reveals the fusible numbers, show they are all dyadic rationals, and explore the well-ordered structure whose gaps encode epsilon naught—the proof-theoretic strength of Peano arithmetic. Join us as w…
…
continue reading
1
Resilient Cyber w/ Jerry Gamblin - CVE Retrospective & Looking Forward
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41In this episode of Resilient Cyber I'm joined by one of my favorite Vulnerability Researchers, Jerry Gamblin. Jerry recently published a comprehensive 2025 CVE retrospective, which we will dive into, as well as his thoughts around trends and patterns we may see emerge in the vulnerability management landscape moving into 2026 and beyond.…
…
continue reading
1
Claude Code and the Rise of the Personal AI Operating System
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04We explore how a local AI agent becomes a chief of staff on your PC—granting direct file access, persistent rules via Claude.MD, and vibe coding that lets non-programmers design repeatable workflows. Learn about the Model Context Protocol, safety and permissions, and real-world ways to orchestrate Notion, Obsidian, Google Calendar, and more. Note: …
…
continue reading
1
CCNAv7: Introduction to Networks Companion Guide by Cisco
18:52
18:52
Play later
Play later
Lists
Like
Liked
18:52An official textbook for individuals pursuing careers in network administration or seeking to enhance their professional knowledge. The book comprehensively covers fundamental networking concepts, beginning with an overview of network types, topologies, and basic connectivity, and progressing to detailed explanations of protocols and models like TC…
…
continue reading
1
3547: Telus Digital on the Human Role in the Final Mile of AI Safety and Security
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31Today's episode is a conversation with Bret Kinsella, recorded while he was in Las Vegas for CES and preparing to step onto the AI stage. Bret brings a rare combination of long-term perspective and hands-on experience. As General Manager of Fuel iX at TELUS Digital, he operates generative AI systems at a scale most enterprises never see, processing…
…
continue reading