Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Failed Architecture

Failed Architecture

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Failed Architecture is a podcast on architecture and the real world. By opening up new perspectives on the built environment, we seek to explore the meaning of architecture in contemporary society. FA challenges dominant spatial fashions and explores alternative realities, reaching far beyond the architectural community. We combine personal stories with research and reflection, always remaining committed to the idea that architecture is about social justice and climate justice, pop culture a ...
  continue reading
 
Artwork

1
Valormhour

Valormhour

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
valormhour is where we discuss the real tech stuffs. what we need to know to make our tech life better. We'll talk Web Sites, Soft Wares, Hard Ware, Open Source, Architecture, Startup Stories (What's it feel like To succeed and to fail), Artificial Intelligence, Machine Learning, Deep Learning and more.
  continue reading
 
Artwork

1
The Office of Rabbi Sacks

Rabbi Lord Jonathan Sacks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Follow the audio shiurim, lectures and speeches of Rabbi Lord Jonathan Sacks, global religious leader, philosopher, author of over 30 books and moral voice for our time. Rabbi Sacks served as Chief Rabbi of the United Hebrew Congregations of the Commonwealth between September 1991 and September 2013. A full biography - together with an extensive online archive of Rabbi Sacks' work - is available at www.rabbisacks.org or you can follow him on Twitter, Facebook and Instagram @rabbisacks.
  continue reading
 
The Angular Architecture Podcast provides pragmatic discussions about Angular development and architectural topics. If you want to understand how use and leverage the elements in Angular to create amazing solutions, this podcast is for you. Software development isn't easy. This podcast provides relevant information on how to best implement simple elements like NgModules, but takes you further with architectural concerns that every application has...for example: security, authorization, user ...
  continue reading
 
Artwork

1
The Civitas Podcast

Theopolis Institute

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Civitas Podcast, co-hosted by Peter Leithart and James Wood, exists to explore Christian political theology, with a specific focus on contemporary debates about liberalism and post-liberalism, and to elaborate a distinctively "ecclesiocentric" Theopolitan version of post-liberalism.
  continue reading
 
Artwork

1
The Weimar Spectacle

Bremner Fletcher Duthie

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Exploring the extraordinary and astonishing social, political and cultural life of the Weimar Republic. Produced by Bremner Fletcher, singer, actor and kabarett artist and obsessive lover of Weimar culture and history: http://www.bremnersings.com
  continue reading
 
Artwork
 
Noise Between Stations is a podcast about the potential of digital design hosted by Victor Lombardi. We explore the intersection of the Internet, software, hardware, business, and life. We explain things in layperson's terms, but most of our audience is designers and technologists. We focus on issues like product design, visual design, interaction design, information architecture, content strategy, and business strategy. Noise Between Stations is hosted by Victor Lombardi, author of the book ...
  continue reading
 
Would you consider a dilapidated seventies tower block as heritage? In England, some social housing developments have already been given listed status, a level of protection usually associated with castles, monasteries and stately homes. Others are considered as a failed experiment by an outmoded welfare state, fit only for demolition. In this album, we see working class residents of one such estate fighting for its survival. By doing so, they may be challenging some of our fundamental assum ...
  continue reading
 
Artwork

1
Under the Hood

Sankaet Pathak of Synapsefi.com

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Season 2 of Under the Hood, a podcast series brought to you by Synapse. In this series hosted by Synapse Founder and CEO Sankaet Pathak, Under the Hood takes a deep dive into various challenges and opportunities in Fintech. Topics range from technical design & architecture to regulatory and policy challenges. Sankaet is joined by special guests each episode to discuss the most pressing challenges and consider alternate approaches. Our aim is to get technical, go deep and explore b ...
  continue reading
 
Loading …
show series
 
You can find a transcript of this conversation in the article version posted on our website. In an article published in the Guardian earlier last year Jon Henley reported on the state of the housing crisis in Amsterdam. The article’s title took a quote from one of the people that Henley, interviewed: “Everything is just on hold”. For a lot of peopl…
  continue reading
 
Welcome to the Covenant & Conversation series, Rabbi Sacks’ commentary pieces on the weekly Torah portion, exploring ideas and sharing inspiration from the Torah readings of the week.This audio from Rabbi Sacks was recorded in 2016, as part of the Spirituality series.To read and download the written essay, click here: https://rabbisacks.org/covenan…
  continue reading
 
Today I’m interviewing Daniel Brook, the author of a new book on the pioneering sexual rights activist Magnus Hirschfeld, whose Berlin Institute of Sexual Science was a huge attraction in Weimar Berlin and was eventually destroyed by the Nazis, and whose theories are so contemporary they could be taken directly from modern debates about gender, sex…
  continue reading
 
Welcome to the Covenant & Conversation series, Rabbi Sacks’ commentary pieces on the weekly Torah portion, exploring ideas and sharing inspiration from the Torah readings of the week.This audio from Rabbi Sacks was recorded in 2018.To read and download the written essay and translations, click here: https://rabbisacks.org/covenant-conversation/acha…
  continue reading
 
19 years ago Rabbi Sacks delivered this Yom HaZikaron-Yom Ha'atzmaut address. He spoke, as was his annual tradition as Chief Rabbi, at the Bnei Akiva ceremony in May 2006, at Finchley Synagogue (Kinloss). These words, 19 years later, could almost have been freshly written for today. His message is timeless, and timely. Find more content like this o…
  continue reading
 
Welcome to the Covenant & Conversation series, Rabbi Sacks’ commentary pieces on the weekly Torah portion, exploring ideas and sharing inspiration from the Torah readings of the week.This audio from Rabbi Sacks was recorded in 2018.To read and download the written essay and translations, click here: https://rabbisacks.org/covenant-conversation/tazr…
  continue reading
 
Peter Leithart and James Wood have a conversation with David P Goldman. David P. Goldman is a Washington Fellow at The Claremont Institute’s Center for the American Way of Life. His research focuses on China, American manufacturing, and trade policy. Goldman is Deputy Editor of Asia Times, where he has written the "Spengler" column since 2001. He i…
  continue reading
 
Welcome to the Covenant & Conversation series, Rabbi Sacks’ commentary pieces on the weekly Torah portion, exploring ideas and sharing inspiration from the Torah readings of the week.Listen to this audio recording from Rabbi Sacks in 2020.To read and download the written essay and translations, click here: rabbisacks.org/covenant-conversation/shemi…
  continue reading
 
When it comes to protecting your data, not all backup strategies are created equal. In this episode, we dig deep into the evolution of backup best practices — starting with the tried-and-true 3-2-1 method, moving to the more resilient 3-2-1-1-0, and finally unpacking the enterprise-grade 4-3-2 model. We’ll explore why each strategy was created, wha…
  continue reading
 
In this episode, we break down four of the most talked-about cybersecurity technologies—EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), XDR (Extended Detection and Response), and NDR (Network Detection and Response). You’ll learn: How EDR tools provide real-time endpoint visibility and behavioral analytics to detect mal…
  continue reading
 
In this deep dive episode, we break down the StoneFly DR 365V, an all-in-one backup and disaster recovery solution that addresses data protection, compliance, and scalability. Whether you're a small business or managing enterprise-level data, this episode explores the key features of the DR 365V, including its hardware options, SCVM software, Veeam…
  continue reading
 
Welcome to Covenant & Conversation essays, Rabbi Sacks’ commentary on the weekly Torah portion, explores new ideas and sharing inspiration from the Torah readings of the week.Listen to this audio recording from Rabbi Sacks in 2018.To read and download the written essay and translations, click here: https://rabbisacks.org/covenant-conversation/tzav/…
  continue reading
 
Not all data recovery services are created equal. In this episode, we break down the core differences between Backup as a Service (BaaS), Recovery as a Service (RaaS), and Disaster Recovery as a Service (DRaaS)—three acronyms often confused but with radically different capabilities, costs, and outcomes. We use relatable analogies and real-world exa…
  continue reading
 
In this episode, we dive into the growing link between cyber insurance eligibility and immutable backups. As ransomware attacks become more frequent and sophisticated, insurance providers are tightening requirements—and businesses that can’t prove solid data protection may face steep premiums or outright denial of coverage. We explore: The rise in …
  continue reading
 
"Replication isn’t just a technical checkbox—it’s your digital insurance policy." In this episode, we dive deep into the four most common data replication methods—array-based, host-based, hypervisor-based, and network-based—and unpack their unique advantages, limitations, and ideal use cases. Whether you’re safeguarding financial data, powering vir…
  continue reading
 
Welcome to Covenant & Conversation essays, Rabbi Sacks’ commentary on the weekly Torah portion, explores new ideas and sharing inspiration from the Torah readings of the week.Listen to this audio recording from Rabbi Sacks in 2015.To read and download the written essay and translations, click here: https://rabbisacks.org/covenant-conversation/vayik…
  continue reading
 
Peter Leithart and James Wood have a conversation with Aaron Renn. Aaron Renn is a writer and consultant in Indianapolis, and author of the book Life in the Negative World: Confronting Challenges in an Anti-Christian Culture. His writings appear in a number of leading global publications, including The Guardian, The Wall Street Journal, The Atlanti…
  continue reading
 
AI and machine learning (ML) demand massive amounts of data, seamless scalability, and high-speed access—which is why traditional storage solutions often fall short. S3 object storage is rapidly becoming the go-to solution for AI/ML data lakes, enabling organizations to handle vast datasets efficiently and cost-effectively. In this episode, we expl…
  continue reading
 
The ESXiArgs ransomware attack is a wake-up call for organizations relying on VMware ESXi servers for virtualization. Targeting unpatched and vulnerable systems, this ransomware encrypts virtual machines, leaving businesses locked out of their critical workloads. In this episode, we uncover: 🔹 How ESXiArgs ransomware infiltrates VMware environments…
  continue reading
 
As hospitals and healthcare providers transition from paper to digital, medical record storage and archiving have become critical challenges. From electronic health records (EHRs) to PACS imaging systems, healthcare organizations must manage massive volumes of sensitive patient data while ensuring compliance with HIPAA and other regulations. In thi…
  continue reading
 
AI workloads are pushing traditional IT infrastructure to its limits. In this episode, we break down how AI storage and servers must evolve to handle massive datasets, high-speed processing, and scalable performance. We’ll explore key challenges like latency, bandwidth, and the role of NVMe SSDs, high-capacity storage tiers, and GPU acceleration. J…
  continue reading
 
Manufacturing is under attack. Ransomware is rapidly becoming one of the biggest threats to industrial operations, bringing production lines to a halt, disrupting supply chains, and costing businesses millions in lost revenue. In this episode, we dive into the alarming rise of ransomware in the manufacturing sector, exploring how cybercriminals tar…
  continue reading
 
Data loss isn’t always caused by hardware failures—it can happen through accidental deletions, insider threats, and ransomware attacks that target storage volumes. In this episode, we break down Volume Deletion Protection, a critical safeguard that keeps your data intact even when disaster strikes. 🔹 What is Volume Deletion Protection and how does …
  continue reading
 
Hospitals and healthcare providers are on the frontlines of a growing cyber crisis—ransomware attacks that lock down critical systems, disrupt patient care, and put lives at risk. In this episode, we dive into how ransomware is crippling the healthcare industry and what can be done to stop it. 🔹 Why healthcare is one of the biggest targets for cybe…
  continue reading
 
Schools, colleges, and universities are storing more data than ever—from student records and research data to online learning platforms. But with the rise of ransomware, accidental deletions, and system failures, how can educational institutions ensure their data stays safe, accessible, and recoverable? In this episode, we break down the backup and…
  continue reading
 
Ransomware is evolving, and attackers aren’t just encrypting your files—they’re deleting your backups to leave you with no way out. So, how do you fight back? Immutable snapshots. In this episode, we dive into how immutable snapshots work, why they’re the best defense against ransomware, and how you can set them up on your NAS storage. Unlike tradi…
  continue reading
 
Backups are your last line of defense against ransomware attacks—but what if ransomware can delete them too? Many organizations assume that having backups means they’re safe, but modern ransomware actively targets and destroys backups before demanding a ransom. In this episode, we break down how ransomware finds, encrypts, and deletes backup data, …
  continue reading
 
On 30 June 1937, Joseph Goebbels, the Reich Minister for Propaganda and Enlightenment, authorised the Director of the Reich Chamber for Culture, Adolf Ziegler, to select and confiscate paintings and sculptures from public collections for a major exhibition on 'degenerate art'. Ziegler said “What's been gathered together in [this] exhibition constit…
  continue reading
 
Ransomware threats are constantly evolving, and Lynx ransomware is one of the latest and most dangerous strains making headlines. But what makes this malware so effective? And how can businesses defend against it? In this episode, we take a deep dive into how Lynx ransomware infiltrates systems, encrypts critical data, and demands hefty ransoms fro…
  continue reading
 
In today’s digital world, passwords alone aren’t enough to keep cybercriminals out. Multi-Factor Authentication (MFA) has become a critical security measure, adding an extra layer of protection against unauthorized access, data breaches, and identity theft. But how does it really work? And why are some businesses still not using it? In this episode…
  continue reading
 
Ransomware is no longer just a tool for elite hackers—it’s now a service for sale on the dark web. Ransomware-as-a-Service (RaaS) has transformed cybercrime, allowing even low-skilled attackers to launch devastating ransomware campaigns against businesses, governments, and individuals. In this episode, we break down how RaaS works—from its subscrip…
  continue reading
 
Banks, credit unions, and financial institutions are prime targets for ransomware attacks, with cybercriminals seeking to steal sensitive financial data or hold entire networks hostage for massive payouts. The financial sector faces a relentless wave of cyber extortion, with devastating consequences—including service disruptions, regulatory fines, …
  continue reading
 
Ransomware attacks are wreaking havoc on the automotive industry, bringing production lines to a grinding halt and costing manufacturers millions in downtime and recovery. But why is this industry such a prime target? In this episode, we break down how ransomware infiltrates automotive supply chains, assembly lines, and dealerships, exposing critic…
  continue reading
 
In this episode, we dive deep into LockBit ransomware, a modern cyber threat that’s making headlines worldwide. We’ll explore how LockBit operates—from its initial intrusion methods to the sophisticated encryption techniques it uses to hold organizations hostage. Discover the tactics behind its rapid data encryption, and learn about the double exto…
  continue reading
 
In this episode, we dive deep into Conti ransomware, one of today’s most notorious cyber threats. We explore how Conti infiltrates networks, the sophisticated methods it uses to encrypt data, and its infamous double extortion tactics. By breaking down Conti’s technical architecture—from its initial breach and infection strategies to the robust encr…
  continue reading
 
AI is evolving faster than ever—are you keeping up? In this episode, we break down the most impactful AI tools of 2025, from text-to-speech advancements to game-changing productivity hacks. Whether you're a creator, entrepreneur, or tech enthusiast, discover how AI can streamline your work, spark creativity, and revolutionize entire industries. Plu…
  continue reading
 
Welcome to Covenant & Conversation essays, Rabbi Sacks’ commentary on the weekly Torah portion, explores new ideas and sharing inspiration from the Torah readings of the week.Listen to this audio recording from Rabbi Sacks in 2017.To read and download the written essay and translations, click here: https://rabbisacks.org/covenant-conversation/vayak…
  continue reading
 
In this episode, we dive into the world of Remote Access Trojans (RATs) — malicious software that gives cybercriminals stealthy control over your systems. We break down how RATs work, from their initial infection to the way they provide attackers with complete remote access. Drawing from real-world examples and expert analysis, we discuss the tacti…
  continue reading
 
In this episode, we dive into the deployment of the StoneFly SA365 Cybersecurity SIEM Appliance, exploring how it strengthens security by providing real-time threat detection, log management, and compliance solutions. Learn how organizations can enhance their cybersecurity posture, streamline incident response, and protect critical data with this p…
  continue reading
 
Your internet connection might not be as secure as you think. Man-in-the-Middle (MITM) attacks allow hackers to secretly intercept your communications, steal sensitive data, and even alter transactions—without you ever noticing. In this episode, we break down MITM attacks, explaining how they work and why they’re more common than most people realiz…
  continue reading
 
Ransomware attacks are evolving, and Akira ransomware is quickly becoming a major threat to businesses worldwide. But what makes Akira different from other ransomware strains? And more importantly—how can organizations defend against it? In this episode, we break down Akira ransomware step by step—how it infiltrates networks, encrypts data, and dem…
  continue reading
 
In this gripping episode, we dive into the hidden world of botnets—massive networks of hijacked devices controlled by cybercriminals. These digital armies are responsible for launching devastating attacks, from crippling DDoS campaigns to massive data breaches. But what exactly makes botnets so dangerous, and how can organizations defend against th…
  continue reading
 
Did you know a single line of malicious code could expose your entire database to hackers? SQL Injection (SQLi) remains one of the most dangerous and widely used cyberattack techniques, allowing attackers to manipulate databases, steal sensitive data, and even take full control of applications. In this episode, we dive deep into how SQL injection w…
  continue reading
 
Data is more than just storage—it's about security, efficiency, and innovation. In this deep dive, we explore how StoneFly.com is transforming enterprise data management with high-performance storage solutions, hybrid cloud integration, and cutting-edge disaster recovery. Whether you're dealing with petabytes of data or ensuring compliance in regul…
  continue reading
 
Imagine your website, servers, or entire business grinding to a halt—not because of a technical failure, but because of a massive, coordinated cyberattack. DDoS (Distributed Denial-of-Service) attacks have become one of the biggest threats to businesses, governments, and online services worldwide. But how do they work, and why are they so hard to s…
  continue reading
 
Cyberattacks are getting smarter, but few threats are as stealthy and devastating as Advanced Persistent Threats (APTs). Unlike typical cyberattacks, APTs operate over months or even years, quietly infiltrating systems, stealing sensitive data, and evading detection. In this episode, we dive deep into the world of APTs—how they work, who they targe…
  continue reading
 
Welcome to Covenant & Conversation essays, Rabbi Sacks’ commentary on the weekly Torah portion, explores new ideas and sharing inspiration from the Torah readings of the week.Listen to this audio recording from Rabbi Sacks in 2015.To read and download the written essay and translations, click here: https://rabbisacks.org/covenant-conversation/vayak…
  continue reading
 
Remote Code Execution (RCE) is one of the most dangerous cyber threats, allowing attackers to take full control of systems from anywhere in the world. In this episode, we break down how RCE vulnerabilities work, the methods hackers use to exploit them, and real-world examples of devastating RCE attacks. We’ll cover the different types of RCE exploi…
  continue reading
 
In this episode, we dive into how IHMA, a global leader in microbiology and infectious disease research, safeguards its critical data while meeting strict compliance standards. Discover how Veeam and StoneFly work together to provide rock-solid data protection, seamless backup and recovery, and enterprise-grade storage—ensuring that vital research …
  continue reading
 
Loading …
Listen to this show while you explore
Play