Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
…
continue reading
IoT Insiders Podcasts
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Proximity and location technologies are key to the Internet of Things (IoT) and are causing our digital and physical worlds to converge. Mr. Beacon is a series of interviews with the leaders of companies that are at the center of this revolution. Steve Statler wrote "Beacon Technologies", a survival guide for people that want to design solutions that use Bluetooth beacons to create experiences that combine location awareness with the power of cloud computing. Hosted on Acast. See acast.com/p ...
…
continue reading
The We talk IoT podcast keeps you up to date with major developments in the world of the internet of things, IIoT, artificial intelligence, and cognitive computing. Our guests are leading industry experts, business professionals, and experienced journalists as they discuss some of today’s hottest tech topics and how they can help boost your bottom line. You can follow We talk IoT – the Internet of Things Business podcast anywhere you get your podcasts. About the host: Stefanie Ruth Heyduck i ...
…
continue reading
IoT Talks and Tales The IoT Podcast is joined by the most influential leaders in IoT every Thursday to break down the current and up & coming IoT trends, unravel the misconceptions, doubts and forecast predictions on the ongoing journey for the Internet of Things. This podcast will have something for everyone, whether you’re an entrepreneur searching for fresh ideas or the lessons learned, an engineer always looking to be one step ahead with the latest solutions, or someone with a pure enthu ...
…
continue reading
Arman Dezfuli-Arjomandi and guests discuss the fast-growing Helium network, providing worldwide coverage for mobile phones and IoT devices.
…
continue reading
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Podcast by The IT Insider
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
Welcome to the most electrifying technology podcast on the planet! Buckle up as we dive headfirst into the thrilling world of Blockchain, Bitcoin, Crypto, DeFi, Web3, Artificial Intelligence, IoT, and the Metaverse. We've got the hottest tech startups, the coolest CEOs, the most innovative founders, the most influential influencers and the savviest investors, all sharing their wisdom with us every single week. So buckle up and join your host Brandon Zemp for a technology deep-dive. Ready to ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The Windows Insider Team is taking the podcast airwaves to share all things future of Windows, Insider community and beyond. Transcripts provided with each episode.
…
continue reading
The official podcast of Fobi AI Inc. (FOBI: TSXV FOBIF: OTCQB). Get the latest updates on what's happening at Fobi.
…
continue reading
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
…
continue reading
At Accenture, we work at the frontier of the technology defining our lives today and tomorrow. Tune in to hear our people share opinions and perspectives on the technology trends impacting our world, their own experiences on the front line of innovation, and how Accenture is harnessing the potential of these technologies to create meaningful change.
…
continue reading
Smart People Podcast is a biweekly, interview-based podcast that features today's most well respected thought leaders engaging in authentic, insightful conversation for the benefit of the listener. The host, Chris Stemp, and his co-host/producer Jon Rojas, utilize their insatiable curiosity and relatable charm to provoke their guests into giving the interview of a lifetime. Every single guest has achieved a high level of recognition within their arena and in doing so has collected a wealth o ...
…
continue reading
The UPSTACK Podcast is an ever-evolving conversation on all things digital infrastructure, giving CTOs, CIOs, CISOs and other tech leaders "food for thought” as they push to stay ahead of the technology curve. Greg Moss, UPSTACK’s Partner and Managing Director, invites guests to talk candidly about the latest technology infrastructure topics. Co-hosted by SVP of Marketing, Alex Cole, this is sure to be a podcast worth listening to.
…
continue reading
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
…
continue reading
The Smart Life is a podcast looking at all things Smart Home and IoT. From the latest tech to the bigger questions around the role tech has to play in our lives, each episode, hosts Jess and Thomas will be joined by industry experts to break down the news behind the headlines.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Welcome to the Sustainable Supply Chain podcast, hosted by Tom Raftery, a seasoned expert at the intersection of technology and sustainability. This podcast is an evolution of the Digital Supply Chain podcast, now with a laser-focused mission: exploring and promoting tech-led sustainability solutions in supply chains across the globe. Every Monday at 7 am CET, join us for insightful and organic conversations that blend professionalism with an informal, enjoyable tone. We don't script our epi ...
…
continue reading

1
Connecting Everything, Inside Volvo's Massive IoT Strategy
39:10
39:10
Play later
Play later
Lists
Like
Liked
39:10Most industrial IoT deployments struggle with the same challenge: dozens of pilot projects that never reach production scale. Volvo Group broke this cycle with a strategic transformation connecting hundreds of millions of assets across 140 factories worldwide. The secret wasn't just technology — it was organizational change that unified scattered e…
…
continue reading

1
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
…
continue reading

1
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
1:23:13
1:23:13
Play later
Play later
Lists
Like
Liked
1:23:13In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
…
continue reading

1
Smart Labels, Smarter Business with Adrich CEO Adhithi Aji
57:05
57:05
Play later
Play later
Lists
Like
Liked
57:05In this episode, Adhithi Aji, CEO of Adrich, shares how her company’s smart labels turn everyday products into connected devices that track usage and auto-replenish—no app needed. Discover how Adrich is driving ROI, sustainability, and consumer engagement through ambient IoT and AI. With 97% accuracy and real-world use cases from Clorox to olive oi…
…
continue reading

1
Ep. 559 Whitney Hart | Intersection of AI and Marketing with Avenue Z
34:31
34:31
Play later
Play later
Lists
Like
Liked
34:31For episode 559 of the BlockHash Podcast, host Brandon Zemp is joined by Whitney Hart, Chief Strategy Officer for Avenue Z. Whitney Hart is a strategic powerhouse, driving elite clients to online dominance through cutting-edge marketing, AI, blockchain, and finance strategies. As Chief Strategy Officer at Avenue Z, she architects proprietary approa…
…
continue reading

1
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
…
continue reading

1
How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341
1:04:11
1:04:11
Play later
Play later
Lists
Like
Liked
1:04:11A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
…
continue reading

1
Neferpitou Claims Cyberattack on French Naval Defense Giant
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
…
continue reading

1
3364: MongoDB Simplifies AI Development With Integrated Vector Search
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54In this episode of Tech Talks Daily, I sat down with Boris Bialek, VP and Field CTO at MongoDB, for a conversation that moved well beyond databases. As AI continues to accelerate across sectors, MongoDB is positioning itself at the intersection of modern data architecture and intelligent application development. Boris shared how his team is simplif…
…
continue reading

1
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
…
continue reading

1
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
…
continue reading

1
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
…
continue reading

1
Ep. 558 Greg Di Prisco | Universal Stablecoin Platform with M0 Labs
16:31
16:31
Play later
Play later
Lists
Like
Liked
16:31For episode 558 of the BlockHash Podcast, host Brandon Zemp is joined by Greg Di Prisco, Co-Founder & Chief Architect of M0 Labs while at Permissionless 4. M0 is the universal stablecoin platform. With M0, developers can build their own application-specific digital dollars and embed those into any use case. Learn more at https://www.m0.org ⏳ Timest…
…
continue reading

1
tj-actions Lessons Learned, US Cyber Offense, this week's enterprise security news - Dimitri Stiliadis - ESW #417
1:42:01
1:42:01
Play later
Play later
Lists
Like
Liked
1:42:01Interview Segment - Lessons Learned from the tj-actions GitHub Action Supply Chain Attack with Dimitri Stiliadis Breach analysis is one of my favorite topics to dive into and I’m thrilled Dimitri is joining us today to reveal some of the insights he’s pulled out of this GitHub Actions incident. It isn’t an overstatement to say that some of the less…
…
continue reading

1
From Data to Action: Embedding Climate Risk into Supply Chain Strategy
39:15
39:15
Play later
Play later
Lists
Like
Liked
39:15Send me a message In this episode of the Sustainable Supply Chain podcast, I sat down with Ollie Carpenter, Director of Environmental Risk Analytics at Risilience, to unpack how global businesses are moving from climate ambition to action, through risk-informed decision making. Ollie and his team work with companies like Nestlé, Burberry, and Maers…
…
continue reading

1
3363: ABB on Building a Smarter and More Resilient Power Grid
22:20
22:20
Play later
Play later
Lists
Like
Liked
22:20When we think about innovation in technology, power grids rarely enter the spotlight. Yet, they are the foundation for everything from artificial intelligence to electric vehicles and data centers. In this episode, I spoke with Adrian Guggisberg, President of the Smart Power Division at ABB, to unpack the evolving role of electrical power distribut…
…
continue reading

1
3362: Inside LVT’s Mission to Deter Crime Before It Happens With Tech
31:29
31:29
Play later
Play later
Lists
Like
Liked
31:29In a digital-first world where cybersecurity often dominates headlines, the conversation around physical security can sometimes feel like an afterthought. But what if technology could bring a new level of intelligence, proactivity, and efficiency to protecting real-world environments? In this episode, I sat down with Ryan Porter, co-founder and CEO…
…
continue reading

1
Ep. 557 Altan Tutar | Web3 Yield Gen & BitcoinFi with MoreMarkets
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43For episode 557 of the BlockHash Podcast, host Brandon Zemp is joined by Altan Tutar CEO & Co-founder of MoreMarkets while at Permissionless 4. MoreMarkets is a global liquidity marketplace. He has previously worked with the NEAR Foundation as a Core Contributor, building NEARs Data Availability product. Learn more at https://www.moremarkets.xyz/ ⏳…
…
continue reading

1
3361: Why AidKit Built a Tech Platform for Equitable Aid Distribution
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15In today’s episode of Tech Talks Daily, I connected with Brittany Christenson, CEO of AidKit, to explore how cutting-edge technology is being used not to disrupt markets or chase margins, but to deliver real, measurable social impact. AidKit is a public benefit corporation building infrastructure that helps vulnerable communities access aid quickly…
…
continue reading

1
Ep. 556 Gregg Bell | The Hedera Ecosystem & RWAs in 2025
22:34
22:34
Play later
Play later
Lists
Like
Liked
22:34For episode 556 of the BlockHash Podcast, host Brandon Zemp is joined by Gregg Bell, Chief Business Officer of the Hedera Foundation. Gregg brings over 15 years of experience bridging traditional and digital finance, including senior roles at two multi-billion-dollar hedge funds, co-founding A3 Financial Investments, and leading operations and inve…
…
continue reading

1
3360: How Certinia Is Bringing AI Agents Into Professional Services at Scale
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11When we talk about the future of enterprise software, AI is front and center. But behind the buzzwords, real transformation is happening in how businesses plan, execute, and deliver professional services. In this episode, I sat down with Raju Malhotra, Chief Product and Technology Officer at Certinia, to explore how AI is shifting from theory to pr…
…
continue reading

1
3359: Exploring Legal Innovation with the National Association of Licensed Paralegals (NALP)
43:42
43:42
Play later
Play later
Lists
Like
Liked
43:42In this episode of Tech Talks Daily, I had the opportunity to sit down with Amanda Hamilton, patron and director at the National Association of Licensed Paralegals (NALP). While many of our discussions often focus on cutting-edge technology and digital transformation, today’s conversation tackled a very different kind of disruption, one happening q…
…
continue reading

1
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
…
continue reading

1
Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More... - SWN #497
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07Total Recall, Steam, Storm-2063, Unmarker, Altair, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-497
…
continue reading

1
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
…
continue reading

1
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
…
continue reading

1
Ep. 555 Aliyyah Koloc | Preserving Cultural Heritage Onchain with Raphael Coin
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36For episode 555 of the BlockHash Podcast, host Brandon Zemp is joined by Aliyyah Koloc, a Professional Race Car driver serving as an Ambassador for Raphael Coin. Aliyyah Koloc is an off-road rally and endurance driver, competing with Buggyra ZM Racing. She is the current GT4 champion in the European 24h Series. ⏳ Timestamps: 0:00 | Introduction 0:5…
…
continue reading

1
Prompt Injection to RCE: When AI Gets Compromised | The AppSec Insiders Ep.16
18:29
18:29
Play later
Play later
Lists
Like
Liked
18:29In this episode, we unpack CVE-2025-49596, where prompt injection, CSRF, and localhost access were chained to achieve RCE in the MCP Inspector AI tool. Learn how the exploit worked, what it reveals about LLM security risks, and how to defend against similar threats with sandboxing, access controls, and DevSecOps monitoring.…
…
continue reading

1
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
…
continue reading

1
3358: Pearson Research Challenges the Myth of AI Replacing Tech Jobs
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00What if the average UK tech worker could reclaim almost an entire workday each week without extra hours simply by harnessing AI tools like ChatGPT and robotic process automation more effectively? In this episode, I sit down with Oliver Latham from Pearson’s Enterprise Learning and Skills division, to unpack research revealing how intelligent automa…
…
continue reading

1
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
…
continue reading

1
Protecting G-Suite/MS365 and Security News - Abhishek Agrawal - PSW #884
2:11:14
2:11:14
Play later
Play later
Lists
Like
Liked
2:11:14We chat with Material Security about protecting G Suite and MS365. How else are you monitoring the most commonly used cloud environments and applications? In the security news: Google Sues Badbox operators Authenticated or Unauthenticated, big difference and my struggle to get LLMs to create exploits for me Ring cameras that were not hacked Malicou…
…
continue reading

1
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
…
continue reading

1
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
…
continue reading

1
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
…
continue reading

1
The Age of Inference: Generative AI & Sustainability
24:51
24:51
Play later
Play later
Lists
Like
Liked
24:51Send us a text In this episode of Embedded Insiders, Rich and I sit down with Sid Sheth, CEO and co-founder of d-Matrix, to explore the ongoing generative AI boom—why it’s becoming increasingly unsustainable, and how d-Matrix is addressing the challenge with a chiplet-based compute architecture built specifically for AI inference. Next, Ken brings …
…
continue reading

1
Ep. 554 Sam Sandiford | Crypto Funding Rate Analysis, Impact of ETFs and New Products at BitMEX
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24For episode 554 of the BlockHash Podcast, host Brandon Zemp is joined by Sam Sandiford, Head of Product for BitMEX. BitMEX is a popular cryptocurrency derivatives exchange and trading platform. It allows users to trade cryptocurrency-based financial products, including perpetual contracts, futures contracts, and options contracts, with high leverag…
…
continue reading

1
#126 - AI Transformation at Scale: Practical Adoption Across 150+ Engineers with Peter Gostev // Head of AI @ Moonpig
1:05:48
1:05:48
Play later
Play later
Lists
Like
Liked
1:05:48Navigating AI hype versus implementation reality in large engineering organizations The AI transformation challenge isn't just technical—it's organizational. Peter Gostev, Head of AI at Moonpig, discusses building practical AI capabilities in a 600-person company while navigating the gap between AI hype and implementation reality. From managing ado…
…
continue reading

1
Keeping trains on track: How AXO Track prevents railway delays with IoT sensors - We talk IoT #70
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12In this episode, we explore the critical intersection of IoT technology and railway infrastructure with Oliver von Sperber, Managing Director at AXO Track, a German startup transforming railway switch maintenance. Twenty per cent of train delays stem from switch malfunctions, costing operators millions and frustrating passengers worldwide. Oliver a…
…
continue reading

1
Computing in the Cosmos: Sophia Space's Mission to Move Data Centers Into Orbit
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04In this episode of Over the Air, Ryan Prosser talks with Sophia Space CEO Rob DeMillo about moving computing infrastructure beyond Earth's atmosphere, the unique challenges of orbital data centers, and why the next frontier of space exploration might be driven more by commerce than curiosity. Editor’s Note: Rob meant to say 4 Kelvin, not “4 km,” wh…
…
continue reading

1
How to Hack Global Activism with Tech, Music, and Purpose: A Conversation with Michael Sheldrick, Co-Founder of Global Citizen and Author of the book: “From Ideas to Impact” | Redefining Society And Technology ...
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com Title: How to hack Global Activism with Tech, Music, and Purpose: A Conversation with Michael Sheldrick, Co-Founder of Global Citizen and Author of “From Ideas to Impact” Guest: Michael Sheldrick Co-Founder, Global Citizen | Author of “From Ideas to Impac…
…
continue reading