Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Microservices Podcasts

show episodes
 
The podcast of foojay.io, a central resource for the Java community’s daily ​information needs, a place for friends of OpenJDK, ​and a community platform for the Java ecosystem​ — bringing together and helping Java professionals everywhere.
  continue reading
 
Artwork

1
Technical Debt: Design, risk and beyond

Maxim Silaev & Nikita Golovko

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We talk to experienced architects and technology leaders about the architectural choices they’ve made — the good, the bad, and the costly. From scaling systems to integrating legacy platforms, from misaligned domains to governance gaps, we discuss how architecture impacts technical debt. You’ll hear honest stories of architectural missteps, what teams learned from them, and how they built systems designed not just to work, but to last.
  continue reading
 
Artwork

1
Brewing Microservices

Christopher Meiklejohn

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast discussing everything cloud computing, serverless, microservices, and distributed systems that, each episode, starts with a discussion of a single academic paper and expands out to related academic research and industrial products and systems.
  continue reading
 
Artwork

1
Rawkode Live

Rawkode Academy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Rawkode Live is a live, hands-on, stream that aims to teach you how to use the latest, freshest, shiniest Cloud Native and Kubernetes tools. This is an edited, sans live demo, version of this stream. Sharing with you the thoughts and ideas of the best founders, maintainers, and contributors within the Cloud Native eco-system.
  continue reading
 
Artwork

1
Lancer: It’s Just Business

lancer-its-just-business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Tuesday Crew Returns in this Mecha and Mechwarrior inspired TTRPG. Mercenaries (Contractors) to Avari Military Solutions, the team find themselves involved in locking down a rebellion on a far rim system. How will this rag tag group of ”Solidiers” manage on the far rim, where the locals hate you and the corporation wont pay your bonus? Find out in Lancer; Its Just Business.
  continue reading
 
Artwork
 
eCommerce Talks is the latest podcast series by Divante. We discuss tech, current trends, and insights from around the eCommerce world. It features industry experts, business leaders, and interesting influencers who share their knowledge.
  continue reading
 
Artwork

1
DevXPod

Chris & Pauline

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Curious about what developer experience is and why it is important? Join Chris Weichel and Pauline Narvas with special guests as they deep dive into the ins and outs of developer experience.
  continue reading
 
The Loosely Coupled Show is where James Hickey and Derek Comartin share their strongly held opinions about topics relating to software architecture and design: HTTP REST design, asynchronous messaging patterns, distributed systems, microservices, SOA, Domain-driven design, etc. From time-to-time, we chat with industry experts who have specific specializations within the field of software development & design.
  continue reading
 
Artwork

1
podcast_v0.1

podcast_v0.1

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Boost your Software Engineering, DataOps, and SRE, career. podcast_v0.1 decodes the latest vital research, delivering essential insights in an easy audio format. Stay ahead of trends, inform your technical decisions, and accelerate your professional growth. Essential knowledge for curious engineers.
  continue reading
 
Artwork

1
Artistry of Code

Grzegorz Godlewski, Marek Urbanowicz and Artur Wolny

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The IT podcast where Grzegorz Godlewski, Artur Wolny and Marek Urbanowicz, together with their guests, talk about topics related to the world of IT. We are looking for ways of doing things right and having fun with it doing so. Software, architecture, soft skills, teamwork (and other, crazy, buzzwords).
  continue reading
 
Artwork

1
Kubernetes Bytes

Ryan Wallner & Bhavin Shah

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Kubernetes Bytes is a podcast bringing you the latest from the world of cloud native data management. Hosts Ryan Wallner and Bhavin Shah come to you from Boston, Massachusetts with experienced backgrounds in cloud-native tech. They'll be sharing their thoughts on recent cloud native news and talking to industry experts about their experiences and challenges managing the wealth of data in today's cloud-native ecosystem.
  continue reading
 
ShipTalk is the podcast series on the ins, outs, ups, and downs of software delivery. This series dives into the vast ocean Software Delivery, bringing aboard industry tech leaders, seasoned engineers, and insightful customers to navigate through the currents of the ever-evolving software landscape. Each session explores the real-world challenges and victories encountered by today’s tech innovators. Whether you’re an Engineering Manager, Software Engineer, or an enthusiast in Software delive ...
  continue reading
 
Welcome to Craft Beer and Data™️, the show with data conversations that will leave you thirsty for more. In this Podcast, Talend's Director of Developer Evangelism, Nick Piette, and Mark Balkenende, Director of Technical Marketing, talk about anything from the importance of datavaults methodology to batch vs. streaming. Sit back, grab a beer, and enjoy!
  continue reading
 
Wix Engineering Podcast. For developers, by Wix Engineering: Architecture, scaling, mobile and web development, management and more. The stories and the insights of our very own engineers, shoulder to shoulder, with some of the most prominent voices in the tech community.
  continue reading
 
Coding Over Cocktails is created by TORO Cloud, a company that offers a low-code, API centric platform for application development & integration. This podcast series will tackle issues faced by enterprises as they manage the process of digital transformation, application integration, low-code application development, data management, and business process automation. Watch out for exciting and engaging content from guests who will touch on topics such as APIs as the center and foundation of a ...
  continue reading
 
Cockroach Lab’s Big Ideas in App Architecture is a podcast for architects and engineers building modern data-intensive applications and systems. In every weekly episode, an innovator joins the show to share useful insights from their experiences building reliable, scalable, maintainable systems. Welcome to Big Ideas in App Architecture!
  continue reading
 
Artwork

1
The Doppler Cloud Podcast

The Doppler Cloud Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ready to leverage resources outside your firewall? The Doppler podcasts cover all things cloud while focusing on how to prepare the traditional enterprise to look beyond conventional computing. We talk about what’s new, what’s working, and have expert guests who provide the advice you need to be successful in the clouds. Read by over 10,000 IT leaders, The Doppler weekly email reports and quarterly print editions answer your critical cloud questions and keep you informed on the cloud trends ...
  continue reading
 
Artwork

1
New Relic Modern Software Podcast

Modern Software podcast from New Relic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The New Relic Modern Software Podcast is designed to share insights and perspectives on the most important things happening in the world of software analytics, cloud computing, application monitoring, development methodologies, programming languages, and related topics. New Relic execs, customers, and industry experts participate in lively discussions on how to create, deliver, and manage great software experiences. New Relic, because you need to know what's happening in your software and sy ...
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-power-ai-analytics-and-microservices-using-the-same-data. Adam Bellemare explains how data streaming unifies AI, analytics, and microservices—solving data access challenges through real-time, scalable pipelines. Check more stories related to data-science at: https:/…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/securing-java-microservices-with-zero-trust-architecture. Zero Trust replaces outdated network trust in microservices. Learn how identity, mTLS, OPA, and Vault build a secure, modern architecture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
  continue reading
 
In this Foojay Podcast, we're exploring a critical topic that's becoming increasingly important in our industry: developing sustainable software that is both performant and environmentally friendly. At the Devoxx and JFall conferences, I had fascinating conversations about how we as Java developers can make a real impact on both our cloud costs and…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. Check more stories related to cybersecurity at: ht…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/when-just-following-guidelines-isnt-enough. A Reddit post highlights the failure modes of internal AI agents. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #ai-security, #machine-learning,…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths. Why API security requires more than just endpoint protection and what developers can take away. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto. Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. Check more stories related to cybersecurity at: https://hackernoon.com/…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs. Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today. Check more stories related to cybersecurity at: https:…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-the-mitre-attandck-framework-actually-works. ATT&CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
Welcome to another episode of the Foojay Podcast! Just like in the previous episode, I bring you conversations from two of Europe's premier Java conferences - Devoxx in Belgium and JFall in the Netherlands. At these conferences, I had the opportunity to speak with members of the Java community about topics ranging from the evolution of Java itself …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/security-is-a-practice-not-a-one-time-project. Learn why security is a continuous practice, not a one-time project. Build daily habits, use smart tools, and strengthen your security posture. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/credshields-joins-forces-with-checkmarx-to-bring-smart-contract-security-to-enterprise-appsec. Nearly half of the largest DeFi breaches trace back to smart contract flaws. Research indicates that up to 89% of smart contracts contain vulnerabilities. Check more stories rela…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/data-platform-as-a-service-a-three-pillar-model-for-scaling-enterprise-data-systems. DPaaS solves the enterprise data scalability paradox with declarative policies, multi-plane architecture, and continuous reconciliation. Check more stories related to data-science at: http…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-rag-improves-database-management. RAG is transforming database management with accurate retrieval, real-time insights, and natural language querying to help teams manage and understand data inte Check more stories related to data-science at: https://hackernoon.com/c/da…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/securitymetrics-wins-data-leak-detection-solution-of-the-year-in-2025-cybersecurity-breakthrough. SCI reduces the chances of an e-commerce skimming attack through the inspection of a website's shopping cart by a SecurityMetrics Forensic Investigator. Check more stories rel…
  continue reading
 
Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/componentcast Join the Discord! - https://discord.gg/NVmHBXNfBX Buy some Merch! - https://component-cast.myspreadshop.co.uk/ ***************************************** Cast: Commissar Roach as our Game Host Midgeman as Eoghan "Padre" O'Kirwan - @Midgeman RivalzoneGaming as Harrison "D…
  continue reading
 
In this Foojay Podcast, we're diving deep into some of the most exciting developments happening within the OpenJDK and TornadoVM projects. At the Devoxx and JFall conferences, we spoke with several speakers and visitors about some of the major themes that are shaping the future of Java development. The first guest is Moritz Halbritter from the Spri…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/take-a-virtual-tour-of-surveillance-tech-along-the-usmexico-border. We looked at surveillance technology in 27 different cities on both sides of the border. Some of the tech I saw were autonomous towers, aerostat blimps, etc. Check more stories related to cybersecurity at:…
  continue reading
 
What happens when a company’s biggest vulnerability isn’t its software, but its communication? In this episode of Technical Debt: Design, Risk and Beyond, hosts Maxim Silaev and Nikita Golovko explore the collapse of Interserve, a UK-based outsourcing and construction giant that suffered a major data breach in 2020, exposing the personal data of ov…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-password-tool-in-2-weekends-and-got-1000-users. Indian government portals are a mess when it comes to passwords. Millions of Indians get locked out daily, not knowing what they did wrong. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-$10-billion-logic-error-what-happens-when-security-moves-faster-than-sanity. This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. Check more stories related to cybersecurit…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of. We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
  continue reading
 
Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/componentcast Join the Discord! - https://discord.gg/NVmHBXNfBX Buy some Merch! - https://component-cast.myspreadshop.co.uk/ ***************************************** Cast: Commissar Roach as our Game Host Midgeman as Eoghan "Padre" O'Kirwan - @Midgeman RivalzoneGaming as Harrison "D…
  continue reading
 
Maven 4 is approaching its release, bringing many improvements to the build tool powering millions of Java projects. In this Foojay Podcast episode, we talk about Apache Maven 4, a significant milestone that has been years in the making. Maven has been the backbone of Java dependency management and build automation since the early 2000s; however, t…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/from-data-fragmentation-to-billion-dollar-insights-the-vision-of-manish-ravindra-sharath. Manish Ravindra Sharath unified fragmented enterprise data using PySpark & cloud-native systems,boosting efficiency 99% and driving multimillion-dollar growth. Check more stories rela…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/building-a-layered-defense-against-web-scraping. Discover how a three-layer data-protection model blends AI, risk-based gating, and legal context to stop web scraping while preserving user trust. Check more stories related to data-science at: https://hackernoon.com/c/data-…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/transforming-global-it-compliance-rashmi-sets-new-standards-in-nist-framework-implementation. Rashmi Bharathan leads a global NIST compliance overhaul, improving audit readiness by 70% and setting new benchmarks in IT governance excellence. Check more stories related to cy…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/to-infinity-and-delete. In 1998, disaster struck at Pixar. A single mistyped command — rm -rf / — began erasing Toy Story 2 from existence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-every-e-commerce-brand-should-know-about-prompt-injection-attacks. Prompt injection is hijacking AI agents across e-commerce. Learn how to detect, prevent, and defend against this growing AI security threat. Check more stories related to cybersecurity at: https://hack…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-ipinfo-turns-registry-data-into-real-intelligence. Explore IP addresses, ASNs, and RIR challenges—and see how IPinfo transforms static WHOIS records into dynamic, verifiable intelligence. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-protect-your-kids-online-when-theyre-playing-video-games. Avoid linking external services to your game console, such as signing in with a social media account or other platform and set up restricted child accounts. Check more stories related to cybersecurity at: htt…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/arsen-launches-smishing-simulation-to-help-companies-defend-against-mobile-phishing-threats. The tool lets companies create and send their own text-message campaigns safely, at scale. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Y…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/security-that-moves-at-dev-speed-practical-ways-to-shift-left. Shift Left Security practices developers actually like — with code examples, guardrails, and policy as code to reduce friction. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ai-sidebar-spoofing-attacksquarex-uncovers-malicious-extensions-that-impersonate-ai-browser-sidebar. The attack can trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration. Check more stories related to c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/smart-attacks-smarter-defenses-how-ai-is-transforming-ddos-attacks. AI makes DDoS attacks 287% more sophisticated. Learn adversarial AI defense, behavioral biometrics, and other strategies that work today. Check more stories related to cybersecurity at: https://hackernoon.…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/cosmo-the-graph-visualization-tool-built-for-your-terminal. Cosmo is a terminal-based interactive graph visualizer that automatically layouts and displays complex data structures for quick exploration. Check more stories related to data-science at: https://hackernoon.com/c…
  continue reading
 
This is part 2 of the interviews recorded on September 19th, 2025, at the first AI4Devs Conference (https://amsterdam.ai4devs.io/) in Amsterdam. In Part 1, we explored many AI-related topics as libraries, security, infrastructure, use cases, and more. In this second part, we'll dive into data science, tools for better AI development, Java in the cl…
  continue reading
 
In this episode of ShipTalk, host Dewan Ahmed sits down with Adeeb Valiulla, a leader in developer productivity and engineering excellence at Harness, to explore how AI is transforming the very definition of software productivity. Adeeb shares his journey from building early engineering metrics systems at Sensormatic to leading developer efficiency…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-businesses-are-turning-space-data-into-a-tool-for-risk-resilience-and-sustainability. Satellites are reshaping insurance, supply chains, and sustainability—here’s how space data became core to global business strategy. Check more stories related to data-science at: htt…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-data-innovation-changed-a-states-infrastructure-engine. Deepak Chanda modernized Massachusetts’ infrastructure systems through data-driven process innovation—turning inefficiency into lasting operational reform. Check more stories related to data-science at: https://ha…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea Check mor…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method. Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. Check more stories…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation. Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. Check more stories related to…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks. Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. Check more stories related to cybersecurity at: https://hackernoon.com/…
  continue reading
 
Secure Boot was designed to solve one of the most fundamental security problems in computing: how to ensure that only trusted software starts your machine. But like any architectural decision, it came with its own trade-offs, and its own technical debt. In this episode of Technical Debt: Design, Risk and Beyond, Maxim Silaev and Nikita Golovko expl…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha Check more st…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/building-resilient-operations-through-itil-based-incident-management. ITIL 4 transforms cloud incident management with automation, observability, and adaptive governance—cutting MTTR by 47% and boosting resilience. Check more stories related to cybersecurity at: https://ha…
  continue reading
 
On September 19th, 2025, the first AI4Devs conference (https://amsterdam.ai4devs.io/) took place in Amsterdam. I grabbed my camera and microphone to talk with speakers and attendees about the revolution in AI-powered coding and application development. In this first part, we'll explore Spring libraries, security, infrastructure and scaling, real-wo…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/quantum-photons-deliver-the-ultimate-random-number-generator. HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices Check more stories related to cybersecurity at: ht…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/inside-the-ai-driven-supply-chain-how-scribe-security-is-building-trust-at-code-speed. Scribe Security’s ScribeHub combines signed provenance, SBOMs, and AI agents to secure AI-generated code and meet global supply chain regulations. Check more stories related to cybersecu…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play