Away Days Podcast is an episodic documentary series focused on unreported stories from the fringes of society. We’re compassionately documenting the underground without watering it down or editorially obscuring it. This is independent journalism with no filter. Real, raw, and ugly. Journalist Jake Hanrahan, the host and creator of Away Days has spent the last 10 years embedded in places he’s not meant to be. With unique access and a straightforward style of on-the-ground reporting, the liste ...
…
continue reading
Embedded Security Podcasts
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
Welcome to video version of “Cybersecurity Where You Are,” the podcast of the Center for Internet Security® (CIS®). Cybersecurity affects us all — whether we’re online at home, managing a company, supporting clients, or running a state or local government. Join us on Wednesdays as Sean Atkinson, CISO at CIS, and Tony Sager, SVP & Chief Evangelist at CIS, discuss trends and threats, explore security best practices, and interview experts in the industry. Together, we’ll clarify these issues, c ...
…
continue reading
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There’s a lot of good work happening that doesn’t get attention because there’s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let’s focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
Battle Lines is The Telegraph’s foreign policy, geopolitics and global conflict podcast. It offers expert analysis and on-the-ground reporting everywhere from China and the United States to the Middle East and Europe. Twice a week, veteran foreign correspondents Roland Oliphant and Venetia Rainey bring you on-the-ground dispatches from the world’s most volatile regions and informed analysis from world-class experts. Whether it’s the Russia-Ukraine war, the Israel-Gaza conflict, Chinese aggre ...
…
continue reading
The Embedded Frontier, hosted by embedded systems expert Jacob Beningo, is a cutting-edge podcast dedicated to exploring the rapidly evolving world of embedded software and embedded system trends. Each episode delves into the latest technological advancements, industry standards, and innovative strategies that are shaping the future of embedded systems. Jacob Beningo, with his deep industry knowledge and experience, guides listeners through complex topics, making them accessible for both sea ...
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Technical interviews about software topics.
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
For history lovers who listen to podcasts, History Unplugged is the most comprehensive show of its kind. It's the only show that dedicates episodes to both interviewing experts and answering questions from its audience. First, it features a call-in show where you can ask our resident historian (Scott Rank, PhD) absolutely anything (What was it like to be a Turkish sultan with four wives and twelve concubines? If you were sent back in time, how would you kill Hitler?). Second, it features lon ...
…
continue reading
Join Matias Madou for the interview series that brings the world's leading cybersecurity experts, educators, and academics to your living room. Chatting about all things software security, secure coding and the industry at large, it's the podcast for security enthusiasts everywhere.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
The SAP Business Technology Platform Podcast
…
continue reading
The way we move money is changing. Fast. We want control at the touch of a finger-print. We want to send money in real-time – to the other side of the world. We want everything in one place, integrated, seamless and on our devices. Ubiquitous, embedded, fast, standardized, frictionless and secure. Global finance trends are hurling towards a unanimous conclusion. These are our Financial Futures. Each episode, we size up the bleeding edge of fintech innovation and explore the trends that are a ...
…
continue reading
Shifting Privacy Left features lively discussions on the need for organizations to embed privacy by design into the UX/UI, architecture, engineering / DevOps and the overall product development processes BEFORE code or products are ever shipped. Each Tuesday, we publish a new episode that features interviews with privacy engineers, technologists, researchers, ethicists, innovators, market makers, and industry thought leaders. We dive deeply into this subject and unpack the exciting elements ...
…
continue reading
An application technology podcast series with industry engineers that promises to keep you up to speed on some of the embedded semiconductor industry’s newest, fastest-growing and most exciting technologies, applications, and design techniques used by renowned industry engineers. Experience endless episodes packed with entertaining discussion topics that cover the latest ins and outs of embedded systems as well as how to thrive in trending markets while avoiding common design pitfalls and st ...
…
continue reading
The MSDW Podcast dives into the latest news and events in the Microsoft Dynamics ERP and CRM community. Produced by the editors of MSDynamicsWorld.com, the podcast features interviews and discussions on the latest issues confronting Dynamics AX, GP, NAV, and CRM users and professionals.
…
continue reading
Welcome to the Responsible Bytes podcast, where we talk about all things safe and responsible technology. Technology is changing our world and the way we live in it. In this podcast we explore what those changes look like and what they mean for our present and our future. Listen in as I chat to people working in and around the technology sector, unpacking our increasingly complex and evolving digital world. Responsible Bytes is created and hosted by Dr Zena Assaad.
…
continue reading
Conversations with founders, for founders.
…
continue reading
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
…
continue reading
Business Matters with Karl Fitzpatrick is a weekly business podcast that has featured over 2,000 interviews with entrepreneurs from Ireland, UK, Australia and the United States. Karl Fitzpatrick is an EY Entrepreneur of the Year Finalist and CEO of Chevron College. Chevron employs 135 staff and delivers further and higher education programmes to over 15,000 students annually, through e-learning. Business Matters is a compelling podcast that delves into all aspects of entrepreneurship and bus ...
…
continue reading
The audio versions of the posts we publish on The ST Blog. Listen at your leisure and learn more about what makes technologies great and innovations meaningful. Get more from technology to get more from life with STMicroelectronics.
…
continue reading
ThingWorx on Air, the podcast that takes the complexity out of IIoT app development.
…
continue reading
Get the lowdown on what’s going on in the mortgage industry in around 20 minutes with our very own Rob Barnard and special guests. In this podcast series we’ll be talking to mortgage industry thought leaders who aren’t afraid to address pressing issues happening in the here and now. The content of this podcast is for UK based mortgage intermediaries. The opinions expressed in this podcast are personal to the presenter and guest and may not reflect the views of Pepper Money. #PepperSpecialist ...
…
continue reading

1
NEW Conditional Access Optimization Agent in Microsoft Entra + Security Copilot in Entra updates
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52Troubleshoot identity issues, investigate risky users and apps, and optimize Conditional Access policies using natural language—with built-in AI from Microsoft Security Copilot in Microsoft Entra. Instead of switching between logs, PowerShell, and spreadsheets, Security Copilot centralizes insights for faster, more focused action. Resolve compromis…
…
continue reading
Our final episode of the Favela Government chapter shows first hand the cycle of never-ending-violence in Rio's favelas. People we met are dead, sewers are wide open, and the gang war continues to keep civilians living in fear. Watch Away Days documentaries at youtube.com/@awaydaystv See omnystudio.com/listener for privacy information.…
…
continue reading

1
'Prepare for war with Russia by 2030': ex-army chief Gen Sir Patrick Sanders on Putin, Iran and troop cuts
50:04
50:04
Play later
Play later
Lists
Like
Liked
50:04General Sir Patrick Sanders has a stark warning: Britain must prepare for war with Russia within five years and start building bunkers and better air defences. Speaking exclusively to our Defence Editor Danielle Sheridan, the former head of the British army points to the Nordic countries and says we need to start taking a leaf out of their book. He…
…
continue reading
Why do people list to this podcast? Sure, they're looking for technical explorations of new libraries and ideas. But often it's to hear the story behind them. If that speaks to you, then I have the perfect episode lined up. I have Barry Warsaw, Paul Everitt, Carol Willing, and Brett Cannon all back on the show to share stories from the history of P…
…
continue reading

1
Closing the Digital Gaps: Embedded vs Integrated Solutions, with Mekorma
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49This episode is sponsored by Mekorma. On this episode we are examining the persistent digital gaps plaguing Accounts Payable teams, despite widespread adoption of AP software. Our guest is Mekorma's Director of Revenue Brendan Coffey, and we explore why disjointed workflows still exist, what those inefficiencies look like in practice, and how they …
…
continue reading

1
You can't trust Putin or Trump': Hamish de Bretton-Gordon on Ukraine, Russia and chemical weapons
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09US President Donald Trump has called out Vladimir Putin's "bullshit" and appears to be getting ready to back major US sanctions against Russia. Could this be the end of Trump's soft spot for the Russian dictator? Venetia chats to veteran army officer and chemical and nuclear weapons expert Hamish de Bretton-Gordon about what might happen next and w…
…
continue reading

1
SE Radio 676: Samuel Colvin on the Pydantic Ecosystem
1:02:06
1:02:06
Play later
Play later
Lists
Like
Liked
1:02:06Samuel Colvin, the CEO and founder of Pydantic, speaks with host Gregory M. Kapfhammer about the ecosystem of Pydantic’s Python frameworks, including Pydantic, Pydantic AI, and Pydantic Logfire. Along with discussing the design, implementation, and use of these frameworks, they dive into the refactoring of Pydantic and the follow-on performance imp…
…
continue reading

1
Expanding Digital Keys, Accelerating Automotive Storage, and AGI
51:29
51:29
Play later
Play later
Lists
Like
Liked
51:29Send us a text In this episode of Embedded Insiders, we’re joined by Bahar Sadeghi, Technical Director at CCC, and Alysia Johnson, CCC President, to talk about the latest expansion of the CCC Digital Key™ Certification Program, which now includes support for Bluetooth Low Energy (BLE) and Ultra-Wideband (UWB) technologies. To learn more or register…
…
continue reading
Wiz is a cloud security platform that helps organizations identify and remediate risks across their cloud environments. The company’s platform scans layers of the cloud stack, including virtual machines, containers, and serverless configurations, to detect vulnerabilities and misconfigurations in context. The Model Context Protocol, or MCP, is emer…
…
continue reading

1
John Adams: The Most Influential Yet Overlooked Founding Father?
38:38
38:38
Play later
Play later
Lists
Like
Liked
38:38John Adams is arguably America’s most underrated Founding Father. He has no currency that bears his image. No national holidays celebrate his birth. He’s nearly never named as anyone’s favorite president. And he has no dedicated memorial in Washington, D.C. Despite this, he was perhaps the most influential early American, rivaling Washington, Jeffe…
…
continue reading

1
Why SAP Build Is a Game-Changer for Developer Efficiency | feat. Howard Holton and Mark Wright
54:37
54:37
Play later
Play later
Lists
Like
Liked
54:37New Report Reveals How Using SAP Build Leads To “MASSIVE” Time & Cost Savings For Developers Niklas Siemer is joined by Howard Holton from GigaOM and Mark Wright from SAP to discuss GigaOm’s groundbreaking Total Cost of Ownership (TCO) report on SAP Build. The conversation dives deep into how SAP Build’s AI-powered development tools can dramaticall…
…
continue reading

1
The Paradox of Responsible Nuclear Behavior with Luba Zatsepina
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05In this episode of the Responsible Bytes podcast, Dr. Zena Assaad speaks with Dr. Luba Zatsepina about nuclear deterrence, responsible nuclear behavior, and the implications of artificial intelligence in the context of nuclear security. They explore the psychological aspects of deterrence, cultural differences in understanding nuclear policy, and t…
…
continue reading

1
Embedded Executive: AI Drives Autonomous Buses | Mozee
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41While most autonomous vehicle focus is on the automobile, Mozee is going in a slightly different direction, no pun intended. Mozee is focused on autonomous buses, or vehicles that transport large numbers of people. As you might expect, such a system has its challenges, in addition to those typically associated with an automobile. What makes the com…
…
continue reading

1
Episode 143: Iran's Growing Multidimensional Threat Activity
31:57
31:57
Play later
Play later
Lists
Like
Liked
31:57In episode 143 of Cybersecurity Where You Are, Sean Atkinson is joined by John Cohen, Executive Director of the Program for Countering Hybrid Threats at the Center for Internet Security®(CIS®). Together, they discuss Iran's evolving multidimensional threat activity following U.S. airstrikes on Iranian nuclear facilities in June 2025. Here are some …
…
continue reading

1
EP 66: Secure only the OT code that actually runs
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11Many organizations spend valuable security resources fixing vulnerabilities in code that never actually runs—an inefficient and often unnecessary effort. Jeff Williams, CTO and founder at Contrast Security, says that 62% of open source libraries included in software are never even loaded into memory, let alone executed. This means only 38% of libra…
…
continue reading

1
SED News: Data Land Grabs, Copyright Fights, and the Great AI Talent War
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15Welcome back to SED News, a podcast series from Software Engineering Daily where hosts Gregor Vand and Sean Falconer break down the latest stories in software engineering, Silicon Valley, and the wider tech industry. In this episode, Gregor and Sean dig into Meta’s legal battle over AI training data, discuss the strategic implications of Meta’s $14…
…
continue reading

1
Why Thomas More -- Henry VIII’s Hatchet Man and Heretic Hunter -- Was Himself Executed For Heresy After the English Reformation
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11Thomas More was one of the most famous—and notorious—figures in English history. Born into the era of the Wars of the Roses, educated during the European Renaissance, rising to become Chancellor of England, and ultimately destroyed by Henry VIII, he hunted Protestants for heresy and had them burnt at the stake in the final years of Catholic England…
…
continue reading
Security in the favelas is impoverish young men with guns, who’re untrained and unscrupulous. We went on patrol with these armed foot-soldiers at the higher, more impoverished levels of the shanty town. There we saw a different side to the favela, one of precarious living and environmental degradation. Watch Away Days documentaries at youtube.com/@…
…
continue reading

1
How Israel has reshaped the Middle East + Dalai Lama takes on China
53:15
53:15
Play later
Play later
Lists
Like
Liked
53:15As Israeli Prime Minister Benjamin Netanyahu meets American President Donald Trump to try to hash out a Gaza ceasefire and hostage deal, a new Middle East is emerging from the ashes of years of war. Iran's nuclear programme has been bombed, Syria's new leader is re-establishing diplomatic relations with the West, and the Gulf is considering normali…
…
continue reading

1
How SharePoint Embedded works and how to build AI apps on it
8:29
8:29
Play later
Play later
Lists
Like
Liked
8:29Build AI-powered apps that connect directly to Microsoft 365 content without moving files or compromising security, using SharePoint Embedded. SharePoint Embedded is a fully managed, cloud-based, API-only document management system that lets you securely integrate your custom web or mobile apps, whether built on Azure or other clouds, with Microsof…
…
continue reading

1
Trump wants a new armada. Can America still build one?
47:19
47:19
Play later
Play later
Lists
Like
Liked
47:19Last week, the Pentagon unveiled a jaw-dropping $47.3 billion plan to supercharge its fleet with 19 brand-new battleships. That’s right—nineteen. Up from a paltry five last year. And let’s not kid ourselves: this isn’t just about flexing maritime muscle, it’s a direct message to China—loud and clear. Enter Commander Tom Sharpe, a man who’s not only…
…
continue reading

1
Navigating the Invisible IT Department - CIO Corner
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47In this kickoff episode of our new podcast series focused on IT leadership, we sit down with Tom Doran and Tony Darden of VCIO Global to explore the concept of the "invisible IT department". We start by describing some of the common trends in the evolution of IT management and its ability to be a strategic asset rather than just a cost center. Tom …
…
continue reading
Anaconda is a software company that’s well-known for its solutions for managing packages, environments, and security in large-scale data workflows. The company has played a major role in making Python-based data science more accessible, efficient, and scalable. Anaconda has also invested heavily in AI tool development. Greg Jennings is the VP of En…
…
continue reading

1
Don’t Look to 1903s Germany to Understand American Populism. Look to 1830s New York Revivals Instead.
1:03:45
1:03:45
Play later
Play later
Lists
Like
Liked
1:03:45Something strange happened in Upstate New York during the 1830s. This area was called the "Burned-Over District" because so many fiery religious revivals swept through that it was metaphorically burned over. This region became a key source of the Second Great Awakening, a Protestant revival movement marked by emotional preaching and mass conversion…
…
continue reading

1
Embedded Executive: AI and Space Travel | EdgeCortix
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51Two technologies seem to be barreling ahead at a rapid pace, and there is likely a convergence coming shortly, if it hasn’t already occurred. I’m referring to space travel and artificial intelligence. But in my limited knowledge, there appears to be a disconnect in this marriage, whereby how could AI make decisions on something it’s never encounter…
…
continue reading

1
Embed with UK's elite paratroopers on the Swedish island ready for war with Russia
38:01
38:01
Play later
Play later
Lists
Like
Liked
38:01In this bonus episode, something a bit different: a special dispatch from the Swedish island that has become a Nato bulwark against Russian aggression in the Baltic Sea. Although all troops were removed in 2005, Gotland Island has since been remilitarised and is now home to the Swedish Armed Forces’ newest outfit: the Gotland Regiment. The troops a…
…
continue reading

1
Episode 142: SLTTs and Their Nuanced Cybersecurity Needs
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10In episode 142 of Cybersecurity Where You Are, Sean Atkinson is joined by Anthony Essmaker, former Product Marketing Manager at the Center for Internet Security®(CIS®); and Randy Rose, VP of Security Operations & Intelligence at CIS. Together, they discuss the nuanced, empathetic approach that's required to help U.S. State, Local, Tribal, and Terri…
…
continue reading

1
#512: Building a JIT Compiler for CPython
1:08:18
1:08:18
Play later
Play later
Lists
Like
Liked
1:08:18Do you like to dive into the details and intricacies of how Python executes and how we can optimize it? Well, do I have an episode for you. We welcome back Brandt Bucher to give us an update on the upcoming JIT compiler for Python and why it differs from JITs for languages such as C# and Java. Episode sponsors Posit Talk Python Courses Links from t…
…
continue reading

1
Idea to Implementation: Fast-tracking Innovation with MCU/MPU Design Enablement
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Embedded designs typically start with choosing the right microcontroller or microprocessor, for everything from robots to smart wearable devices. As the central function control of the system, it is essential to choose an MCU or MPU solution that will give engineers the ability to meet their evolving requirements, and to bring their innovative desi…
…
continue reading

1
Rethinking Startups: Inside the Venture Studio Model with Thorbjørn Rønje
1:07:50
1:07:50
Play later
Play later
Lists
Like
Liked
1:07:50In this episode, Viktor Petersson sits down with Thorbjørn Rønje, founder of Bifrost Studios, to unpack the venture studio model and why he believes it’s a smarter, faster way to build startups. Thorbjørn explains how Bifrost applies a playbook-driven approach to validate product ideas quickly, reduce risk, and bring businesses to life without wast…
…
continue reading

1
SE Radio 675: Brian Demers on Observability into the Toolchain
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41Brian Demers, Developer Advocate at Gradle, speaks with host Giovanni Asproni about the importance of having observability in the toolchain. Such information about build times, compiler warnings, test executions, and any other system used to build the production code can help to reduce defects, increase productivity, and improve the developer exper…
…
continue reading

1
ByteDance’s Container Networking Stack with Chen Tang
47:57
47:57
Play later
Play later
Lists
Like
Liked
47:57ByteDance is a global technology company operating a wide range of content platforms around the world, and is best known for creating TikTok. The company operates at a massive scale, which naturally presents challenges in ensuring performance and stability across its data centers. It has over a million servers running containerized applications, an…
…
continue reading

1
Operation Barbarossa Saw Millions of POW Executions, Civilian Murders, and Starvation Deaths
52:35
52:35
Play later
Play later
Lists
Like
Liked
52:35Operation Barbarossa, launched by Nazi Germany on June 22, 1941, aimed to swiftly conquer the Soviet Union, targeting key cities like Moscow, Leningrad, and Kyiv. Hitler reportedly said a meeting with his generals before the campaign began "We have only to kick in the door and the whole rotten structure will come crashing down," With German forces …
…
continue reading
We want to see what life is like for the civilians of the favela. So far we've only been around armed foot-soldiers and serious gang members. What we find in the heart of the favela is more incredible than we ever expected. Watch Away Days documentaries at youtube.com/@awaydaystv See omnystudio.com/listener for privacy information.…
…
continue reading

1
Chinese naval drills put Indo-Pacific on edge plus inside Gaza's 'killing fields'
45:09
45:09
Play later
Play later
Lists
Like
Liked
45:09For several weeks, two Chinese aircraft carrier battle groups have been conducting unprecedented drills in the Western Pacific, sailing further from Beijing than ever before. What message is China trying to send to the world and what can we learn about its Navy’s capabilities? Venetia chats to RUSI's Philip Shetler‑Jones, who specialises in Indo-Pa…
…
continue reading

1
How Trump took us to the brink of World War 3 and back again
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38This week in Trumpland: Trump bombed Iran on Saturday, declared its nuclear programme "obliterated" by Sunday, shrugged off Iranian missile strikes on Monday, and by Tuesday had single-handedly forced a ceasefire between Iran and Israel—only for it to nearly collapse hours later. Then, as if that wasn’t enough, he turned up at the NATO summit in Th…
…
continue reading

1
Think Like a Scammer: Cybersecurity Lessons for CFOs from SignUp & Eftsure
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17In this episode, our guests from SignUp Software and Eftsure use AP automation as an entry point into a bigger story: how finance leaders are becoming cybersecurity leaders. Our guests, Rob Ashe of SignUp and Gabe Garcia of Eftsure, discuss the organizations' strategic partnership, why it will help Dynamics 365 Finance & Operations users, and the r…
…
continue reading

1
OpenAI for Government & 5G Smart Manufacturing
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17Send us a text In this episode of Embedded Insiders, Editor-in-Chief Ken Briodagh dives into the transformative role of AI in Smart Manufacturing and the impact of 5G connectivity on enterprise operations with Telit Cinterion’s Bill Dykas, Senior Product Line Manager, and Stan Gray, SVP of IoT Broadband and High Cat Vertical Sales. But first, Rich,…
…
continue reading

1
WayForward Games with Tomm Hulett and Voldi Way
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03WayForward is a renowned video game studio that was founded in 1990. The company has developed games for publishers such as Capcom, Konami, and Nintendo and has released their games across major hardware platforms from the last 35 years. They are also the creators of the Shantae series of 2D platformers. WayForward recently developed the latest gam…
…
continue reading

1
Pistol Duels Existed Across the 19th-Century World, But Only the Chaos of the American West Produced Gunfighters
51:30
51:30
Play later
Play later
Lists
Like
Liked
51:30To understand American history and its deep-seated relationship with violence, we must look to the last three decades of the 1800s in the American West, which had the highest murder rate per capita in American history. And it all boils down to one place: Texas. Texas was born in violence, on two fronts, with Mexico to the south and the Comanche to …
…
continue reading

1
Secure your AI apps with user-context-aware controls | Microsoft Purview SDK
9:11
9:11
Play later
Play later
Lists
Like
Liked
9:11Build secure, compliant AI apps with code-based controls that dynamically respond to user context using Microsoft Purview for AI app developers. With built-in protections, prevent data leaks, block unsafe prompts, and avoid oversharing without rewriting your app. As a developer, focus on innovation while meeting evolving security and compliance req…
…
continue reading

1
Embedded Executive: Acquisition Eases AI/ML Into Wearables | Nordic Semiconductor
9:13
9:13
Play later
Play later
Lists
Like
Liked
9:13Designing wearables with integrated AI /ML just got one step easier with Nordic Semiconductor’s acquisition of Neuton.AI. While the two companies had already been working together, you can expect a lot more integration between Nordic’s MCUs and the very low-power AI IP that Neuton.AI has become famous for. On this week’s Embedded Executives podcast…
…
continue reading

1
Episode 141: A Human-Centered Take on Password Policies
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18In episode 141 of Cybersecurity Where You Are, Tony Sager is joined by Phyllis Lee, VP of SBP Content Development at the Center for Internet Security®(CIS®); and Julie Haney, Computer Scientist & Human-Centered Cybersecurity Researcher at the National Institute of Standards and Technology (NIST). Together, they use a human-centered understanding of…
…
continue reading

1
#511: From Notebooks to Production Data Science Systems
54:15
54:15
Play later
Play later
Lists
Like
Liked
54:15If you're doing data science and have mostly spent your time doing exploratory or just local development, this could be the episode for you. We are joined by Catherine Nelson to discuss techniques and tools to move your data science game from local notebooks to full-on production workflows. Episode sponsors Agntcy Sentry Error Monitoring, Code TALK…
…
continue reading

1
SE Radio 674: Vilhelm von Ehrenheim on Autonomous Testing
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49Vilhelm von Ehrenheim, co-founder and chief AI officer of QA.tech, speaks with SE Radio's Brijesh Ammanath about autonomous testing. The discussion starts by covering the fundamentals, and how testing has evolved from manual to automated to now autonomous. Vilhelm then deep dives into the details of autonomous testing and the role of agents in auto…
…
continue reading