Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

IoT Security Podcasts

show episodes
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
  continue reading
 
Artwork

1
IoT Unplugged

IoT insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Artwork

1
Next in Tech

S&P Global Market Intelligence

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
  continue reading
 
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Artwork
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
The IOT Review

Industrial IOT Podcast by IrecaMedia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We live in an era where businesses are digitally disrupted almost on a daily basis. The Industrial Internet of Things (IoT) is a unique framework to enable businesses exploit the power of digital innovations and emerge as disruptors (and winners). The IOT Review is a podcast specifically designed to empower business decision makers and IT practitioners with highly relevant technology and strategic insights that's needed to integrate IoT in their business models... to gain in-depth know-how o ...
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
The Conversations of Things podcast series is hosted by Joe Dugandzic and features interesting guests from inside and outside the technology world, discussing everything from the smart home to general tech to all of the connected gadgets in our lives. Where is all of this technology taking us? Is it helpful or harmful in the long run? And, of course, discussions on recent tech news and the latest must-have devices.
  continue reading
 
Artwork

1
Security Boulevard Chat

Security Boulevard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
IoT on Tap

Randy Pitcher, Chris Herrera

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IoT on Tap is a weekly podcast focusing on the Internet of Things from a developers perspective. Chris Herrera and Randy Pitcher from Hashmap, Inc will be talking about how someone can reasonably go from the "hello world" of IoT to actually doing advanced analytics and machine learning on their device data. Music: https://www.bensound.com
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork
 
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
  continue reading
 
Artwork

1
The BLC Connection

Ben Lomand Connect

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The BLC Connection Podcast is a fun and informative show from Ben Lomand Connect that answers your questions about the internet, Wi-Fi, home security and more, and brings you information on the stories and events in “Ben Lomand Country.” Bryan, Karen and Micah take you behind the scenes of Ben Lomand Connect, where the cooperative connects Middle Tennessee with the latest in communications technology and with businesses that are making a difference in our service territory. The BLC Connectio ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
  continue reading
 
Speaking of Service uncovers practical ways to grow service revenue, control costs, and improve customer satisfaction. If you’re looking to innovate, gain a competitive edge, or just learn about the latest service trends, you’ve come to the right place! Also check: www.ptc.com/speakingofservice
  continue reading
 
Artwork

1
Inside Electronics

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Electronic Design has been serving the engineering community with pride for decades, providing news, commentary, and interviews about the industry. Hosted by industry veteran Alix Paultre, the Inside Electronics podcast brings you commentary, news, and interviews about the things going on in the electronic design engineering community and its surrounding business ecosystem.
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Welcome to "Analyze Happy: Crafting Your Modern Data Estate", the podcast where data meets delight! Dive into the world of modern data estate tools and discover how to harness advanced analytics, data governance, and AI transformation to accelerate growth in your organization. With a spotlight on the Microsoft ecosystem—think Fabric, Azure Databricks, Power Platform, IoT Edge, and Real-Time Intelligence—we’ll explore best practices, actionable insights, and the latest innovations to build a ...
  continue reading
 
Artwork

1
Elevate the Edge

Maribel Lopez & Jo Peterson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Elevate the Edge helps companies understand what edge computing is and how the market will evolve. The podcast will help technology leaders build successful strategies that deliver business value by learning what works from the masters and how to avoid pitfalls. ElevateTheEdge.com
  continue reading
 
Artwork

1
Hacked Off

Secarma

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork
 
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
  continue reading
 
Artwork

1
City of Tomorrow

We Empower Innovators

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Going “smart” is an aspiration of many cities around the world. Today, smart technology solutions are connecting citizens to their communities in new ways, solving issues to do with efficiency, sustainability and security. The City of Tomorrow Podcast series explores how different stakeholders in the Smart City ecosystem can come together to build safer, more efficient and sustainable cities of the future. Led by Digital Transformation Expert, Manuela Krull, who is also the Managing Director ...
  continue reading
 
Artwork

1
EngCast

Enghouse Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
EngCast delivers the latest tips and insight into the telecommunication sector. With guest hosts and contributions from the Enghouse Networks team, EngCast is designed to help you keep your business at the cutting edge. For more information on Enghouse Networks visit https://enghousenetworks.com/
  continue reading
 
Artwork

1
Zero To Exit

Ankur Shah & Neelima Rustagi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Want to know how to build market-leading technology products? Want to know how to take a startup from nothing multi-billion dollar exit? Zero To Exit is the best business and technology podcast series that will share deep insights from industry leaders on how they successfully led multiple products and companies to critical success. We will invite guests who have been on the battlefield for many years and can share their unique insights on building products, sales machines, company culture, ...
  continue reading
 
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
  continue reading
 
Loading …
show series
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
Kotlin Multiplatform Best Practices: How to Build Fast, Secure, and Scalable Cross-Platform Apps https://knowledge.businesscompassllc.com/kotlin-multiplatform-best-practices-how-to-build-fast-secure-and-scalable-cross-platform-apps/ Kotlin Multiplatform has changed how developers approach cross-platform app development, letting you share business l…
  continue reading
 
.NET MAUI Done Right: Proven Strategies for Building Cross-Platform Mobile and Desktop Apps https://knowledge.businesscompassllc.com/net-maui-done-right-proven-strategies-for-building-cross-platform-mobile-and-desktop-apps/ Building cross-platform apps with .NET MAUI can feel overwhelming when you’re juggling different platforms, UI frameworks, and…
  continue reading
 
Ionic Best Practices: How to Build Fast, Secure, and Scalable Cross-Platform Apps https://knowledge.businesscompassllc.com/ionic-best-practices-how-to-build-fast-secure-and-scalable-cross-platform-apps/ Building cross-platform apps with Ionic can be tricky. You want apps that load fast, keep user data safe, and don’t break when your user base grows…
  continue reading
 
The Ultimate Flutter Best Practices Guide for Modern Developers https://knowledge.businesscompassllc.com/the-ultimate-flutter-best-practices-guide-for-modern-developers/ Building great Flutter apps means more than just writing code that works. This podcast shows you how to write apps that scale, perform well, and are easy to maintain.…
  continue reading
 
React Native for Developers: Everything You Need to Build Modern Mobile Apps https://knowledge.businesscompassllc.com/react-native-for-developers-everything-you-need-to-build-modern-mobile-apps/ React Native development has changed the game for mobile app creation. This podcast shows developers how to master cross-platform mobile app development wi…
  continue reading
 
Top Cross-Platform Mobile App Frameworks in 2025: From React Native to Flutter, Ionic, and Beyond https://knowledge.businesscompassllc.com/top-cross-platform-mobile-app-frameworks-in-2025-from-react-native-to-flutter-ionic-and-beyond/ Mobile app developers and business leaders face a tough choice in 2025: build separate native apps for iOS and Andr…
  continue reading
 
The Future of Serverless App Development: AWS Amplify vs Its Fast-Growing Peers https://knowledge.businesscompassllc.com/the-future-of-serverless-app-development-aws-amplify-vs-its-fast-growing-peers/ Serverless app development has become the go-to choice for developers who want to build and deploy applications without managing servers. As this spa…
  continue reading
 
Firebase Best Practices: How to Build Scalable, Secure, and Efficient Apps https://knowledge.businesscompassllc.com/firebase-best-practices-how-to-build-scalable-secure-and-efficient-apps/ Building Firebase apps that actually work at scale isn’t just about knowing the platform—it’s about following Firebase best practices that prevent your app from …
  continue reading
 
Heroku Best Practices: How to Build Scalable, Secure, and Efficient Apps https://knowledge.businesscompassllc.com/heroku-best-practices-how-to-build-scalable-secure-and-efficient-apps/ Heroku best practices can make or break your application’s success in production. This podcast is for developers, DevOps engineers, and engineering teams who want to…
  continue reading
 
How to Build a Full-Stack App with Supabase, React, and Next.js https://knowledge.businesscompassllc.com/how-to-build-a-full-stack-app-with-supabase-react-and-next-js/ Building a full-stack app with Supabase, React, and Next.js gives you a powerful tech stack that handles both frontend and backend needs without the complexity of managing separate s…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
This episode of Safe Mode features a nuanced conversation with Ben Harris, CEO of Watchtower, who delves into the complexities of vulnerability management in today’s threat landscape. Harris discusses why traditional patching is no longer a guarantee of security, revealing how sophisticated attackers are staying persistent even after organizations …
  continue reading
 
Send us a text The challenge of semantic gaps in RAG systems, where embeddings often miss crucial connections—like linking a "PTO" query to policy language on "prorated annual leave". It details Knowledge RAG design principles for higher accuracy and user satisfaction, emphasizing proven 2025 techniques. These techniques include using LLMs for quer…
  continue reading
 
Mastering Netlify and Vercel: Best Practices for Modern Web Deployment https://knowledge.businesscompassllc.com/mastering-netlify-and-vercel-best-practices-for-modern-web-deployment/ Modern web deployment has transformed how developers ship applications, and Netlify and Vercel lead the pack as top hosting platforms for static sites and serverless a…
  continue reading
 
Rails Naming Conventions Explained: Best Practices for Models, Controllers, and Beyond https://knowledge.businesscompassllc.com/rails-naming-conventions-explained-best-practices-for-models-controllers-and-beyond/ Ruby on Rails follows strict naming conventions that make or break your application’s structure and maintainability. Getting Rails naming…
  continue reading
 
Appwrite Best Practices: Build Secure, Scalable, and Production-Ready Apps https://knowledge.businesscompassllc.com/appwrite-best-practices-build-secure-scalable-and-production-ready-apps/ Building robust applications with Appwrite requires more than just getting your code to work—it demands strategic planning around security, performance, and scal…
  continue reading
 
The Ultimate Back4App Guide: Best Practices for Performance, Security, and Scalability https://knowledge.businesscompassllc.com/the-ultimate-back4app-guide-best-practices-for-performance-security-and-scalability/ Back4App has become a go-to Backend-as-a-Service platform for developers who want to build powerful apps without managing server infrastr…
  continue reading
 
Render, Railway, and Fly.io Best Practices: How to Build Secure, Scalable, and High-Performance Apps https://knowledge.businesscompassllc.com/render-railway-and-fly-io-best-practices-how-to-build-secure-scalable-and-high-performance-apps/ Modern developers need reliable cloud platforms that won’t break under pressure or expose security holes. If yo…
  continue reading
 
How to Simulate the @search Directive in AWS Amplify Gen 2 Using DynamoDB Streams and Lambda to Update OpenSearch https://knowledge.businesscompassllc.com/how-to-simulate-the-search-directive-in-aws-amplify-gen-2-using-dynamodb-streams-and-lambda-to-update-opensearch/ AWS Amplify Gen 2 doesn’t include the @search directive that many developers reli…
  continue reading
 
Master Qlik: Naming Standards and Best Practices for Clean, Consistent Dashboards https://knowledge.businesscompassllc.com/master-qlik-naming-standards-and-best-practices-for-clean-consistent-dashboards/ Messy Qlik dashboards with confusing names waste time and frustrate users. Qlik naming conventions and Qlik best practices transform chaotic repor…
  continue reading
 
Build Smarter Data Pipelines: Talend Naming and Coding Standards That Scale https://knowledge.businesscompassllc.com/build-smarter-data-pipelines-talend-naming-and-coding-standards-that-scale/ Poorly structured Talend data pipelines create maintenance nightmares that slow down your entire data team. Without proper Talend naming conventions and codi…
  continue reading
 
Build Smarter Data Governance Workflows: Ataccama Naming and Coding Standards That Scale https://knowledge.businesscompassllc.com/build-smarter-data-governance-workflows-ataccama-naming-and-coding-standards-that-scale/ Data teams and governance professionals struggle with inconsistent naming conventions and coding standards that create bottlenecks …
  continue reading
 
Unlock Neo4j Excellence: Naming, Modeling, and Query Optimization Best Practices for Graph Engineers https://knowledge.businesscompassllc.com/unlock-neo4j-excellence-naming-modeling-and-query-optimization-best-practices-for-graph-engineers/ Graph databases are transforming how organizations handle connected data, but getting the most out of Neo4j r…
  continue reading
 
Compilers and ADAS aren’t often used in the same sentence. For developers, that anomaly can represent a design challenge, as compilers in general are not designed for this particular application, which also happens to be at the top of the safety and security checklist. To understand how these compilers should be tested and implemented, I spoke to S…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Complete Guide to Migrating DynamoDB, S3, and Cognito Users in Amplify Gen 1 to Gen 2 https://knowledge.businesscompassllc.com/complete-guide-to-migrating-dynamodb-s3-and-cognito-users-in-amplify-gen-1-to-gen-2/ AWS Amplify migration from Gen 1 to Gen 2 can seem overwhelming, but with the right approach, you can move your DynamoDB tables, S3 assets…
  continue reading
 
The Ultimate Guide to Databricks Naming and Coding Standards for Modern Data Platforms https://knowledge.businesscompassllc.com/the-ultimate-guide-to-databricks-naming-and-coding-standards-for-modern-data-platforms/ Messy Databricks workspaces cost teams hours of debugging time and create headaches when new developers join your project. Poor Databr…
  continue reading
 
Master Snowflake: Naming Standards and Best Practices for Scalable Cloud Data Platforms https://knowledge.businesscompassllc.com/master-snowflake-naming-standards-and-best-practices-for-scalable-cloud-data-platforms/ Good Snowflake naming conventions can make or break your cloud data warehouse project. Poor naming standards lead to confused team me…
  continue reading
 
Master MuleSoft: Naming Standards and Best Practices for Clean, Efficient Integrations https://knowledge.businesscompassllc.com/master-mulesoft-naming-standards-and-best-practices-for-clean-efficient-integrations/ MuleSoft projects can quickly turn into a tangled mess without proper naming conventions. Inconsistent naming leads to confusion, longer…
  continue reading
 
Master Informatica: Naming Standards and Best Practices for Scalable Data Workflows https://knowledge.businesscompassllc.com/master-informatica-naming-standards-and-best-practices-for-scalable-data-workflows/ Inconsistent naming conventions can turn your Informatica data workflows into a maintenance nightmare. When teams use random object names and…
  continue reading
 
The Ultimate Guide to DataStage Naming and Coding Standards for Data Engineering Teams https://knowledge.businesscompassllc.com/the-ultimate-guide-to-datastage-naming-and-coding-standards-for-data-engineering-teams/ Messy DataStage projects cost teams weeks of debugging time and create maintenance nightmares that spiral out of control. When data en…
  continue reading
 
dbt Naming Conventions and Coding Standards: Best Practices for Modern Data Transformation https://knowledge.businesscompassllc.com/dbt-naming-conventions-and-coding-standards-best-practices-for-modern-data-transformation/ Messy dbt projects slow down your entire data team and make collaboration a nightmare. Clean, consistent dbt naming conventions…
  continue reading
 
Starburst Best Practices 2025: Naming Conventions, Query Optimization, and Data Governance https://knowledge.businesscompassllc.com/starburst-best-practices-2025-naming-conventions-query-optimization-and-data-governance/ Starburst has become the go-to solution for organizations managing complex data across multiple sources, but getting the most out…
  continue reading
 
Master Apache Airflow: Naming Standards and Best Practices for Workflow Orchestration https://knowledge.businesscompassllc.com/master-apache-airflow-naming-standards-and-best-practices-for-workflow-orchestration/ Apache Airflow powers data pipelines at companies like Airbnb, PayPal, and Reddit, but messy naming conventions can turn your workflows i…
  continue reading
 
From Metric Chaos to Clarity: Prometheus Naming Conventions and Best Practices Explained https://knowledge.businesscompassllc.com/from-metric-chaos-to-clarity-prometheus-naming-conventions-and-best-practices-explained/ Messy metric names are killing your monitoring setup. You spend more time deciphering cryptic labels than actually solving problems…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play