This is my podcast!
…
continue reading
IBM Watson Podcasts
The IBM Developer podcast is the place to hear about open topics and technologies.
…
continue reading
The Voicebot Podcast is about the intersection of voice and artificial intelligence (AI) technologies. It is a weekly look at trends, founders and newsmakers and supplements the daily research, analysis and news found at https://voicebot.ai.
…
continue reading
Stacey Higginbotham (formerly Sr. Editor at Fortune) and co-host Kevin Tofel discuss the latest news and analysis of the Internet of Things. Covers Consumer IoT, Industrial IoT and Enterprise IoT. Guests include Vint Cerf, Om Malik, and people from Amazon.com, AT&T, IBM Watson and more.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Join Jerry Cuomo, IBM Fellow and tech innovator, on Wild Ducks, a podcast that provides a personal and behind-the-scenes look at emerging tech trends, including AI, cybersecurity, quantum computing, and blockchain. Inspired by Thomas J. Watson Jr.'s wild duck analogy, this podcast celebrates unconventional thinkers who challenge the status quo. Enjoy a mix of expert interviews and engaging fictional guests as they explore how these technologies transform industries and empower individuals. S ...
…
continue reading
thinkLeaders tells the stories behind AI and business transformation through engaging interviews with top entrepreneurs, technologists, and researchers at the forefront of disruption. Join host Amanda Thurston as she and her guests offer insights and advice on strategic, data-driven leadership, and innovation. It is a deep dive into emerging technologies that unpacks and explains the issues, having some fun along the way. Brought to you by IBM. This channel is managed by Serena Peters and Am ...
…
continue reading
A podcast exploring real-time communications applications and technologies including WebRTC, Communications API, IoT and other technologies that connect people and things. Hosted by Alan Percy, Communications Industry Veteran
…
continue reading
ScriptPhD.com covers science and technology in entertainment, media and pop culture. Join our podcast as we speak with creative innovators, media leaders and the brilliant scientists shaping a Golden Era of geek chic science content.
…
continue reading
All things AI related that are relevant to Managed Services Providers.
…
continue reading
Subject Matter X was a podcast highlighting the rigorous paths people take on their journeys to becoming subject matter experts. The show is now archived and can be accessed in full at SubjectMatterX.com.
…
continue reading
We have launched our podcast series “Ask QueBIT about Analytics” to share what we have learned with real life stories and practical advice that we hope will help you on your analytics journey. If you are a manager on the front-lines, how do you make the best decisions for your business? It helps if you have easy and immediate access to relevant data, and in a form (mobile vs desktop, image vs spreadsheet grid etc.) that makes sense for the situation. Analytics is the science – and art – of m ...
…
continue reading
The traditional enterprise go-to-market motion is undergoing a transformational shift. B2B buyers are more sophisticated than ever, and operational efficiency is a key focus for every organization. One key function possesses a unique opportunity to shape the future of revenue generation: enablement. On this podcast, we’re bringing you the secrets, strategies, and tactics that successful enablement leaders are using to drive meaningful impact. The Enablement Edge is the go-to resource for sal ...
…
continue reading
Every other week on the Content Marketing for the Future Podcast, Amanda Chiu interviews the modern marketer to uncover how they are building their audience using machine learning technology. For those new or newish to the idea of adding machine learning technology to their content strategy, you will learn how to better sell your story without losing that human touch. Our special guests will be talking about topics like: innovative content marketing practices, targeted audience building stra ...
…
continue reading
1
IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23Provides comprehensive instruction on IBM Watson Solutions for Machine Learning, covering various aspects of Artificial Intelligence (AI) and cognitive tools. The text is structured as a book, detailing concepts from foundational machine learning (ML) and deep learning algorithms, such as linear regression and neural networks, to practical implemen…
…
continue reading
1
Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator
16:17
16:17
Play later
Play later
Lists
Like
Liked
16:17Focusing on Ad Hoc Networks and utilizing the ns-3 simulator. The material covers both the theoretical and practical aspects of simulation, including the formal definition and characteristics of Mobile Ad Hoc Networks (MANETs), various wireless communication technologies (like IoT and Mobile Clouds), and the methodology for designing and analyzing …
…
continue reading
1
Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51A technical resource aimed at IT engineers looking to utilize Zabbix 5 for monitoring their environments. Authored by Nathan Liefting and Brian van Baekel, the book is structured as a recipe-style guide covering a vast array of Zabbix functionalities. Key topics include initial setup and user management, configuring various monitoring types (such a…
…
continue reading
1
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
16:28
16:28
Play later
Play later
Lists
Like
Liked
16:28A deep foundation in blockchain technology, starting with a historical context of money and the centralized systems it relies upon, before introducing the decentralized, trustless model of blockchain. Significant portions detail the operational mechanics of the two leading public blockchains: Bitcoin and Ethereum, covering key concepts such as cryp…
…
continue reading
1
UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)
17:00
17:00
Play later
Play later
Lists
Like
Liked
17:00Focusing on the application of user experience (UX) principles to Extended Reality (XR), which includes Virtual Reality (VR) and Augmented Reality (AR). The content explores the history of XR, the rise of UX design, and how these methodologies are crucial for driving the adoption of immersive technologies in areas like EdTech, MedTech, enterprise, …
…
continue reading
1
Visual Studio Code for Python Programmers
15:58
15:58
Play later
Play later
Lists
Like
Liked
15:58An extensive table of contents and introductory material for a guide on using the popular code editor for Python development. The source details fundamental setup procedures such as installing Visual Studio Code, configuring a Python interpreter and extensions, and managing core editor features like settings, keybindings, and the Command Palette. F…
…
continue reading
1
Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future
13:56
13:56
Play later
Play later
Lists
Like
Liked
13:56Argues that cybersecurity is primarily a behavioral challenge rather than a technological one, emphasizing that people are the cause of nearly all security incidents. The book introduces and elaborates on nine key cybersecurity habits—such as vigilance, skepticism, diligence, and deception—which are presented as actionable behaviors for both indivi…
…
continue reading
1
Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37These excerpts from the book "Hands-on Data Virtualization with Polybase" provide an extensive look at how to implement data virtualization using PolyBase within SQL Server, including its use in Big Data Clusters and Azure Synapse Analytics. The text thoroughly explains the technical details, prerequisites, and setup procedures for connecting SQL S…
…
continue reading
1
Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15A practical guide for building and deploying DevOps pipelines using various open-source tools. The content focuses heavily on Linux fundamentals, including managing files, directories, users, and permissions, while also introducing modern DevOps practices. Specific technologies covered are VirtualBox and Vagrant for creating environments, core web …
…
continue reading
1
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark
14:35
14:35
Play later
Play later
Lists
Like
Liked
14:35A comprehensive guide for security professionals and testers, detailing methodologies for identifying and exploiting numerous web application vulnerabilities. It extensively covers topics like authentication flaws, session management issues, access controls, injection attacks (such as SQL and XML injection), and Cross-Site Scripting (XSS), using to…
…
continue reading
1
Google Analytics Kickstarter Guide: Get Tips to Boost Your Traffic and Sales Using Google Analytics
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43An extensive overview of the Google Analytics platform, explaining its utility for measuring website traffic and user behavior to inform business decisions. The text details the platform's six major report categories—Realtime, Audience, Acquisition, Behavior, and Conversion—and outlines how to interpret core data components like dimensions and metr…
…
continue reading
1
Cloud Native Applications with Jakarta EE: Build, Design, and Deploy Cloud-Native Applications and Microservices with Jakarta EE
15:55
15:55
Play later
Play later
Lists
Like
Liked
15:55Focuses on building, designing, and deploying cloud-native applications and microservices. The book covers foundational concepts like cloud computing basics, major cloud providers (AWS, Azure, Google Cloud), and cloud-native design principles, including the shift from monolithic to microservices architecture. Significant attention is paid to Jakart…
…
continue reading
1
Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43A comprehensive overview of cloud computing concepts, including its history, characteristics, advantages, and disadvantages. The book extensively details the cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, and community), along with a comparative study of the latter. Furthermore, the source material explores …
…
continue reading
1
Linux Device Driver Development: Everything you need to start with device driver development for Linux kernel and embedded Linux
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56This technical resource is intended for experienced users like embedded engineers and kernel hackers and requires prior knowledge of C programming and Linux commands. The content offers comprehensive instruction on developing Linux drivers for kernel version v5.10 and embedded Linux systems, covering essential topics such as setting up the developm…
…
continue reading
In this second half of their conversation, host Jerry Cuomo and Phil Gilbert pick up where they left off—moving from the craft of design to the culture that makes design thrive. Phil shares how his work at IBM revealed that the real challenge wasn’t design talent, but organizational mindset. He explains how he and his team turned culture change int…
…
continue reading
In this first of a two-part conversation, host Jerry Cuomo sits down with Phil Gilbert — entrepreneur, design leader, and the mind behind IBM’s modern design movement. Phil takes us back to his startup roots in the 1980s, when helping professionals adopt personal computers sparked a lifelong passion for design as a force for clarity and connection.…
…
continue reading
1
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22A comprehensive guide for architects and engineers on implementing and scaling modern DevOps practices within large enterprises, focusing heavily on automation, quality assurance, and security. Key topics covered include defining DevOps architecture, managing IT delivery in sourcing models, leveraging AIOps (Artificial Intelligence for IT Operation…
…
continue reading
1
Five Principles for Deploying and Managing Linux in the Cloud
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46A comprehensive guide for migrating and optimizing Linux environments in cloud architectures, with a specific focus on Microsoft Azure but also referencing AWS and other cloud vendors. The content is structured around five core principles, addressing critical topics such as cloud readiness assessment, high availability, performance monitoring, secu…
…
continue reading
1
Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25A practical implementation guide for information technology administrators seeking to plan, design, and deploy Always On VPN using current best practices and various Microsoft technologies. Key technical topics covered include infrastructure prerequisites such as certificate management with PKI and Intune, network configuration with Routing and Rem…
…
continue reading
1
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43A comprehensive guide for individuals aiming to become Security Operations Center (SOC) analysts, covering the essential knowledge, prerequisite technical skills like networking and endpoint security, and the tools critical to the role, such as SIEM and SOAR platforms. The chapters discuss the high demand and career trajectory within the cybersecur…
…
continue reading
1
Losing the Cybersecurity War And What We Can Do to Stop It
15:38
15:38
Play later
Play later
Lists
Like
Liked
15:38A fundamental shift in cybersecurity strategy toward a Zero Trust architecture. The author, an experienced former CIO, identifies five critical battlefields where defenders are currently disadvantaged: Education, Technology, Information, Economics, and Leadership. Testimonials and content previews affirm that the book details the history of this di…
…
continue reading
1
Mastering Go: Harness the power of Go to build professional utilities and concurrent servers and services
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25An extensive overview of the Go programming language. It introduces fundamental concepts such as variables, functions, packages, program flow control, and data types like arrays and slices. Advanced topics covered include Go concurrency with goroutines and channels, systems programming, file I/O, networking (TCP/IP, HTTP, WebSockets, RESTful APIs),…
…
continue reading
1
MS-900 :Microsoft 365 Fundamentals: Exam Cram Notes
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43A comprehensive overview of Microsoft 365 and related cloud concepts. The text thoroughly explains cloud computing fundamentals, including the benefits, economic models, and types like IaaS, PaaS, and SaaS. A significant portion details the diverse Microsoft 365 services covering productivity, collaboration (Teams, Viva, SharePoint), endpoint manag…
…
continue reading
A comprehensive career guide for individuals in or entering the cybersecurity field. The book structures its advice around common career stages, addressing topics such as finding one's "why" for pursuing a security role, developing necessary technical and soft skills like emotional intelligence and effective communication, and strategies for managi…
…
continue reading
1
Red Hat Enterprise Linux 8 Administration: Master Linux administration skills and prepare for the RHCSA certification exam
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18A comprehensive guide for Red Hat Enterprise Linux 8 (RHEL8) administration, detailing various system management topics. The sources cover initial RHEL8 installation on both physical and virtual machines, including advanced options like cloud deployments and automated installation techniques. A significant portion focuses on core administration ski…
…
continue reading
1
Solutions Architect's Handbook: Kick-start your solutions architect career by learning architecture design principles and strategies
13:39
13:39
Play later
Play later
Lists
Like
Liked
13:39A comprehensive overview of the role and responsibilities of a Solutions Architect, focusing heavily on cloud computing environments. The text explores various architectural principles, including the importance of scalability and elasticity, security and compliance, and operational excellence in solution design. It details several architectural pat…
…
continue reading
1
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery)
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13Focused on mastering the Secure Shell (SSH) protocol, primarily using OpenSSH and the Windows client PuTTY. The book is designed to guide both system administrators and general users beyond basic command-line usage, covering advanced topics such as encryption fundamentals, server and client configuration (including specific files like sshd_config a…
…
continue reading
Aims to teach the Go programming language through an engaging, "brain-friendly" approach. It covers fundamental Go concepts such as variables, data types (including arrays, slices, maps, and structs), functions, packages, and control flow (conditionals and loops). The text also introduces advanced topics like pointers, methods, interfaces, error ha…
…
continue reading
1
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
16:27
16:27
Play later
Play later
Lists
Like
Liked
16:27A comprehensive overview of healthcare information security and privacy for practitioners, focusing on the HCISPP certification. It covers critical areas such as medical coding systems (DRG, ICD, SNOMED CT), revenue cycle management, and workflow management in clinical and business settings. A significant portion addresses the regulatory environmen…
…
continue reading
1
Hands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications
26:33
26:33
Play later
Play later
Lists
Like
Liked
26:33A beginner's guide to implementing CI/CD pipelines using Jenkins and YAML for various applications, including mobile, hybrid, and web. The author, a DevOps engineer, emphasizes DevOps as a cultural transformation driven by people, processes, and tools. The text introduces Jenkins, its evolution, and different pipeline types like Scripted, Declarati…
…
continue reading
1
Hacking with Spring Boot 2.4: Classic Edition
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46A structured approach to developing applications using Spring Boot. It covers foundational concepts like building web apps, data access, and developer tools, while also exploring advanced topics such as testing, production operations (including Docker and GraalVM), and building robust APIs. The book further examines messaging solutions and securing…
…
continue reading
A comprehensive overview of fundamental networking concepts. It introduces various network components like RAM, NICs, hubs, switches, and routers, explaining their functions and interactions within a network. The material also details network topologies, including bus, ring, and star, alongside logical and physical implementations. A significant po…
…
continue reading
1
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
…
continue reading
1
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
…
continue reading
1
Secure Access Service Edge (SASE) For Dummies
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
…
continue reading
1
Machine Learning for High-Risk Applications: Approaches to Responsible AI
30:48
30:48
Play later
Play later
Lists
Like
Liked
30:48A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, which have become more common with wider adoption of ML technologies. It outlines a holistic approach to risk mitigation, combining technical practices, bu…
…
continue reading
1
Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in-depth look at ITIL's foundational concepts, including service lifecycle phases like strategy, design, transition, and operation, alongside essential p…
…
continue reading
1
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34An introductory guide to cybersecurity and ethical hacking using Python. It covers fundamental concepts such as network basics, the CIA triad (Confidentiality, Integrity, and Availability), and different types of hackers, including black hat, white hat, and script kiddies. The book outlines the phases and methodologies of hacking, from reconnaissan…
…
continue reading
1
Opportunistic Networks: Fundamentals, Applications and Emerging Trends
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry-forward" mechanism. It details different routing protocols, categorizing them by approaches like replication-based (e.g., Epidemic, Spray and Wait), s…
…
continue reading
1
Open Source Security: Your Network More Secure With Open Source Tools
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into detailed discussions of firewall configuration for network perimeter defense. The text then explores Host Intrusion Detection Systems (HIDS) for server…
…
continue reading
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
…
continue reading
1
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
…
continue reading
1
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
…
continue reading
1
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
…
continue reading
1
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
…
continue reading
1
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
…
continue reading
1
Malware Analysis Using Artificial Intelligence and Deep Learning
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading
1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading
1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading