For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Mobile Application Development Podcasts
Exploring React Native Together
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
We are one of Top Rated Python Mobile Application Development Company in India and we also provide services of website development, web designing and mobile application development at the cost effective rates. Contact us today for more information.
…
continue reading
HI I Introduced you Professional Mobile Application Development Company In United Arab Emirate, They provide software Development Services, App Development, For More Details Get? So Visit site silicongraphics.ae
…
continue reading
We examine the progression of digital technologies, from artificial intelligence to Web 3.0, and discuss how utilizing these advancements can enhance your business operations & revenue in 10 minutes or less. --> https://www.levelupdevelopment.com/
…
continue reading
Through its podcasts, e-con Systems aims to discuss vision related topics spanning camera technology, applications of embedded vision, trends in vision enabled devices across multiple industries etc. You will learn about the challenges in integrating cameras into end products and how to overcome them, feature set of cameras used in various applications, how to choose the right camera that perfectly fits your application, and much more.
…
continue reading
Mobile application development Podcast, sharing valuable information with the engineering community. Interesting guests from all over the world talking about all things mobile development. Hosted by Ross Sinnema from Geo20. The sole purpose is to discuss topics related to mobile application development and help make the information accessible to anyone interested.
…
continue reading
I love making software. I also love sharing that experience with others. I explore it all in this Podcast, from apps to games and in between. From developers just getting started to professionals. We all have something to learn and share with others on our journey.
…
continue reading
Explore all the details related to building your Android/iOS mobile application here and get an idea of the hourly hiring charges for different technologies. At Echoinnovate IT - app development company, we’re in the business of providing Innovative Smart IT solutions, connecting people’s ideas for mobile apps with our experienced mobile app developers. In the process, we get lots of questions about app development.
…
continue reading
Mobile App Development India is a top company with lowest app development cost in India, USA since 2007 with portfolio of 5K+ Application Development. https://www.mobile-app-development-india.com/
…
continue reading
With top-notch & affordable solutions, Artistixe IT Solution is a leading mobile and web development company in India which is focusing on iOS and Android applications development. We offer our web and mobile application development services across the globe.
…
continue reading
Welcome to Sparkout Tech solutions! Stay updated with information about Mobile Application development, Digital marketing, website development! 😎
…
continue reading
Webmyne is a leading web application development and mobile app development company based in India having a head office in Canada. We provide the services for custom software development and we are experts in Laravel, Full Stack, and Angular development. We are professionals in developing innovative websites, custom web applications as well as applications for Android and iOS and Digital Marketing. You can also hire a dedicated developer or a team for your projects if you want. Visit https:/ ...
…
continue reading
In today's highly competitive market of mobile-based applications, identifying an experienced and reliable Android app development company is essential for companies who want to make it in the digital world. iTechnolabs stands out as a reputable and renowned Android application development firm in the USA. With an established track record and a dedication to quality, iTechnolabs has earned a reputation for exceptional Android app development services.
…
continue reading
Weekly show covering Apple, mobile applications, application development, GTD & productivity, workflow and everything else for people like us.
…
continue reading
Tune-in to ProgrammableWeb Radio to hear ProgrammableWeb.com's editor-in-chief discuss current events regarding Web and Mobile Application Development and the API economy. ProgrammableWeb is regarded as the Web's journal of the API economy and it runs the largest directory of public APIs and SDKs on the Internet.
…
continue reading
Gain insights and tips on best practices for software developers from the Development Best Practices Podcast, brought to you by ILM Professional Services. We’ll have discussions about the best practices in development - from new tools, services and methods you can use today to the larger architecture decisions that will set your path for years to come. Expect good helpings of technical insights mixed in with too many dad jokes. Hosted by Jason Erdahl.
…
continue reading
Martinez Duong is a seasoned expert in Android development with a Master’s degree from Swinburne University, Australia, and over a decade of experience in the mobile app industry. He has contributed significantly to cutting-edge Android projects and has served as a consultant and author for ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD for the past two years. His deep expertise in app development, combined with his strategic insights in mobile marketing, has made him a key figure in the te ...
…
continue reading
World Web Technology is one of the leading website designing & mobile application development company located in India, provides custom software development services worldwide. We are backed by a team of 70+ full-time resources who deliver high-quality business solutions to global clients spanning diverse industry verticals. We have successfully completed over 1000+ projects spanning a wide variety of organizations across a range of industries including Corporations, eCommerce Stores, Not-fo ...
…
continue reading
Tools and APIs required to build applications for the iPhone and iPad platforms using the iOS SDK. User interface design for mobile devices and unique user interactions using multi-touch technologies. Object-oriented design using model-view-controller paradigm, memory management, Swift programming language. Other topics include: object-oriented database API, animation, mobile device power management, multi-threading, networking and performance considerations.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Since its inception in 2011, Best Remote Team, an offshore web and mobile app development company, is offering high-quality offshore software and app development services by facilitating businesses with the right and skilled technical brains. You can hire a remote team of dedicated developers with the right skills and attitude for your project. Hire dedicated developers after a thorough screening process and a personal interview to find the best match as per your expectations.
…
continue reading
We are a prominent web and mobile app development company and work in tandem with clients offering them the best quality with market relevancy using latest technologies and ongoing trends which let our clients boost their business standing strong in the competitive market. Vrinsoft has been serving its clients from year 2009. Since the inception, we always wanted to give the best of services to our clients, and adhering to this philosophy, we have served so many companies and helped so that ...
…
continue reading
IndGlobal has extensive experience in providing information technology and digital transformation services with the latest developments in the industry for companies of every size. Focused on Odoo ERP solutions, software development, eCommerce development, mobile applications, web technology, digital marketing, and IoT solutions, we are the number one choice for our esteemed clients worldwide. Having a pool of technological and experienced experts, we are confident to cater to our client's b ...
…
continue reading
A podcast where we explore everything in a modern (and not so modern) application stack. Join us as we talk about everything from modern TypeScript to old-school D.lang, Postgres to SQL Server, Heroku to AWS and everything in between, as we break down different apps, their stacks, and architectures.
…
continue reading
Groovy Web is highly recommended for building cutting-edge digital solutions like Web, Mobile App, SaaS, MVP, MERN, Bots, and Browser Extensions to help businesses ranging from Startups, Mid-Size, to Enterprises digitize their ideas in time and in budget.
…
continue reading
This podcast is for transportation planners and enthusiasts who want to learn PRACTICAL SOLUTIONS to modern day transportation challenges. Learn step-by-step how to plan for new and emerging technologies, increasing e-commerce, resiliency, micromobility, and equity, just to name a few. Co-hosts, Keli Kemp and Kirsten Mote, are certified transportation planners, national experts, and thought leaders at Modern Mobility Partners, a female and minority-owned transportation planning and engineeri ...
…
continue reading
Unity 3D is a fantastic gaming engine for creators that offers a wealth of features and gameplay options. Consider utilizing the Unity 3D game development platform to develop an interactive game that is both fascinating and excellent in its own right. Developing a gaming application will get easier as virtual worlds come to life.
…
continue reading
4
Harvard Extension School's Computer Science E-76: Building Mobile Applications
Dan Armendariz and David J. Malan
Today's applications are increasingly mobile. Computers are no longer confined to desks and laps but instead live in our pockets and hands. This course teaches students how to build mobile apps for Android and iOS, two of today's most popular platforms, and how to deploy them in Android Market and the App Store. Students learn how to write native apps for Android using Eclipse and the Android SDK, how to write native apps for iPhones, iPod touches, and iPads using Xcode and the iOS SDK, and ...
…
continue reading
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
…
continue reading
CEO Jesse Dang, she is the CEO of ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD, is a visionary entrepreneur who co-founded and leads the mobile app promotion company. With a wealth of experience in the Information Technology industry, particularly in application optimization, app promotion, and marketing, she has played a significant role in the company's development and is a trailblazer in the field of app optimization and promotion.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
continue reading
Welcome to "WIKI Bearings", a podcast brought to you by Mineral Circles Bearings. Whether you're a seasoned industry professional or a curious newcomer, join us as we explore everything you need to know about bearings, from their history and development to their modern-day applications and innovations. Each episode is packed with insightful discussions, expert interviews, and valuable insights into the diverse types of bearings, their functionalities, and their significance across various in ...
…
continue reading
1
Result Oriented Digital Marketing Agency in US - North Rose Technologies LLC
North Rose Technologies LLC
Best Result Oriented Digital Marketing Agency in US. We provide all Digital Marketing activities like SEO, SMO, PPC. Website Designing and Website Development, Mobile Application etc.
…
continue reading
Paul Zinah Le is a highly skilled expert in Google Services, specializing in mobile app promotion and Google reviews optimization. With years of experience in the tech industry, Paul has worked on numerous high-impact projects aimed at boosting app visibility and driving engagement through Google campaigns and reviews management. She holds a Master’s degree from Halifax, Nova Scotia, Canada, and is currently an author and consultant for ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD Global, ...
…
continue reading
Daniel Garcy Lee is an accomplished MacOS expert with a wealth of experience in the field. Holding a Master’s degree from The University of Manchester, Daniel has worked on numerous high-impact MacOS projects, contributing to the development of cutting-edge applications. His extensive knowledge of MacOS, combined with his experience in teaching and training, has made him a key player at ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD, where he has significantly advanced the company's MacOS o ...
…
continue reading
Tech Connect is your go-to podcast for all things IT. We'll discuss cutting edge technology as well as historical trends within the industry. We love to hear from our listeners, so reach out if you have an idea for a future podcast or if you just want to say hello. Catapult Systems is an IT consulting company that offers a full spectrum of services including application development, software integration, infrastructure, managed services, user centered design solutions and enterprise mobile a ...
…
continue reading
1
Heal Your Body, Mind, Emotions, and Spirit
Hanna Maria - Certified Life Coach and Emotional Healing Expert
A show about healing your body, spirit, mind and emotions. Led by the International Speaker and Life Coach Hanna, we feature a variety of content and interviews that will make you feel good and look good - from emotional and spiritual wellness to the cutting edge news in health. Hanna is a successful Personal and Executive Coach, COO of a Mobile Application Development company, and a Corporate Adviser.
…
continue reading
Johnson Tran Hoang is a distinguished iOS expert with an extensive background in developing, promoting, and optimizing iOS applications and software solutions. With a rich blend of academic rigor and industry expertise, Johnson Tran Hoang has made substantial contributions to ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD, a leading company specializing in app and software promotion. His leadership and technical acumen have driven ASOServices to become a key player in the global app develop ...
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
XDuce provide develop solutions that help businesses expand enhance productivity and strengthen data security. We deliver software development and enterprise app development for banking, insurance, healthcare, and non-profit industries.
…
continue reading
Robotics 24/7 is your source for news and discussion about the latest developments in automation, including mobile robots, collaborative robots, and industrial systems. This podcast is designed to inform end users, integrators, suppliers, and developers of practical, commercial robotics applications.
…
continue reading
The Decision Intelligence Lab explores practical challenges of applying data science, analytics, and AI to drive real-world business outcomes. Hosted by Prof. Michael Watson (Northwestern University) and Prof. Vijay Mehrotra (University of San Francisco) — both seasoned entrepreneurs, consultants, and researchers — this podcast delivers real-world insights for data professionals, business leaders, & anyone seeking to leverage data for smarter decision making. Each episode features leaders sh ...
…
continue reading
Sonia Randhawa is a Senior Technology Executive. She coordinates innovation and functional advancement across organizations and manages key associations, merges and acquisitions, the incorporation of new plans of action, the incubation of new advances, and the development of elite specialized ability. Sonia Randhawa has held several influential positions at IBM, Nokia Networks/Alcatel-Lucent, F5 Networks and Intel Corporation. https://www.crunchbase.com/person/sonia-randhawa https://www.soni ...
…
continue reading
Audcode provides a quick Arabic summary for technical content (audio, video, articles, books) to keep yourself updated. The summary is provided from developers to developers.
…
continue reading
The Liberators Podcast is designed to promote physical, psychological, spiritual, and financial freedom. 💡
…
continue reading
Welcome to Krify Software Technology, where amazing things happen.
…
continue reading
1
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
…
continue reading
1
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
…
continue reading
1
Robo Bees, side, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet - SWN #523
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
…
continue reading
1
How Autonomous Mobile Robots “See” in 3D Using Time of Flight Technology
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39How do Autonomous Mobile Robots (AMRs) perceive the world around them? In this episode of Vision Vitals - e-con Systems Podcast, we dive deep into how Time of Flight (ToF) technology enables AMRs to “see” in 3D — helping them navigate complex environments safely and intelligently. 🎙️ In this episode: What Time of Flight cameras are and how they wor…
…
continue reading
1
Secure Access Service Edge (SASE) For Dummies
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
…
continue reading
1
Your runbooks are obsolete in the age of agents
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Ryan is joined by Spiros Xanthos, CEO and founder of Resolve AI, to talk about the future of AI agents in incident management and troubleshooting, the challenges of maintaining complex software systems with traditional runbooks, and the changing role of developers in an AI-driven world. Episode notes: Resolve AI is building agents to help you troub…
…
continue reading
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
…
continue reading
1
Machine Learning for High-Risk Applications: Approaches to Responsible AI
30:48
30:48
Play later
Play later
Lists
Like
Liked
30:48A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, which have become more common with wider adoption of ML technologies. It outlines a holistic approach to risk mitigation, combining technical practices, bu…
…
continue reading
1
What leaders need to know from the 2025 Stack Overflow Developer Survey
31:16
31:16
Play later
Play later
Lists
Like
Liked
31:16In this episode of Leaders of Code, Eira May, B2B Editor at Stack Overflow, and Natalie Rotnov, Senior Product Marketing Manager for the Enterprise Product Suite at Stack Overflow, unpack the key takeaways from the 2025 Developer Survey for tech and business leaders. The discussion focuses on the evolving developer relationship with AI, the continu…
…
continue reading
1
Security That Sticks: Shaping Human Behavior - Rinki Sethi, Nicole Jiang - BSW #418
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
…
continue reading
1
Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in-depth look at ITIL's foundational concepts, including service lifecycle phases like strategy, design, transition, and operation, alongside essential p…
…
continue reading
1
The Afterlife, AWS, ClickFix, Agentic AI, Robot Lumberjacks, Robocalls, Aaran Leyland - SWN #522
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
continue reading
1
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34An introductory guide to cybersecurity and ethical hacking using Python. It covers fundamental concepts such as network basics, the CIA triad (Confidentiality, Integrity, and Availability), and different types of hackers, including black hat, white hat, and script kiddies. The book outlines the phases and methodologies of hacking, from reconnaissan…
…
continue reading
1
Open source is giving you choices with your agent systems
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28Ryan welcomes John Dickerson, CEO of Mozilla.ai, to talk about the evolving landscape of AI agents, the role of open source in keeping the tech ecosystem healthy, the challenges OS communities have faced with the rise of AI, and the implications of data privacy and user choice in the age of multi-agent AI systems. Episode notes: Mozilla.ai is build…
…
continue reading
1
Mitigating attacks against AI-enabled Apps, Replacing the CIA triad, Enterprise News - David Brauchler - ESW #429
1:38:26
1:38:26
Play later
Play later
Lists
Like
Liked
1:38:26Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
…
continue reading
1
Opportunistic Networks: Fundamentals, Applications and Emerging Trends
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry-forward" mechanism. It details different routing protocols, categorizing them by approaches like replication-based (e.g., Epidemic, Spray and Wait), s…
…
continue reading
1
Open Source Security: Your Network More Secure With Open Source Tools
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into detailed discussions of firewall configuration for network perimeter defense. The text then explores Host Intrusion Detection Systems (HIDS) for server…
…
continue reading
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
…
continue reading
1
Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland... - SWN #521
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31Erotic Chats, UEFI, F5, Cisco, Doug Sings, Insiders, Lastpass, Sora, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-521
…
continue reading
1
RNR 346 - Shopify's Transition to the (new) Architecture
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46In this episode, Mazen Chami sits down with Mustafa Ali (Director of Engineering and Head of Mobile at Shopify) and Thiago Magalhães (Staff Software Developer at Shopify) to dive deep into Shopify’s transition to the new React Native architecture. Show Notes Shopify Blog: Migrating to React Native's New Architecture by Thiago Magalhaes RNR 319: Sho…
…
continue reading
1
Why camera selection is critical for AMR navigation and safety
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17n this episode of Vision Vitals by e-con Systems, we explore how camera technology shapes the navigation, perception, and safety of Autonomous Mobile Robots (AMRs). From SLAM-based navigation to real-time obstacle detection, the right camera setup determines how intelligently and safely an AMR can operate. Tune in to learn: Why AMRs depend on globa…
…
continue reading
1
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
…
continue reading
Andrei Kvapil, founder of Ænix and core developer of Cozystack, joins Ryan to dive into what it takes to build a cloud from scratch, the intricacies of Kubernetes and virtualization, and how open-source has made digital sovereignty possible. Episode notes: Cozystack is a Kubernetes-based framework for building a private cloud environment. Connect w…
…
continue reading
1
AI, EDR, and Hacking Things - PSW #896
2:04:54
2:04:54
Play later
Play later
Lists
Like
Liked
2:04:54First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
…
continue reading
1
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
…
continue reading
1
Automating Compliance and Risk with Agentic AI as CISOs (R)Evolve - Trevor Horwitz - BSW #417
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
…
continue reading
1
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
27:15
27:15
Play later
Play later
Lists
Like
Liked
27:15Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
…
continue reading
1
Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more... - SWN #520
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-520
…
continue reading
1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
continue reading
1
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
…
continue reading
Ryan welcomes Dhruv Batra, co-founder and chief scientist at Yutori, to explore the future of AI agents, how AI usage is changing the way people interact with advertisements and the web as a whole, and the challenges that proactive AI agents may face when being integrated into workflows and personal internet use. Episode notes: Yutori is building A…
…
continue reading
1
New book from Dr. Anand Singh, why CISOs buy, and the latest news - Anand Singh - ESW #428
1:43:44
1:43:44
Play later
Play later
Lists
Like
Liked
1:43:44Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
…
continue reading
1
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
…
continue reading
1
Malware Analysis Using Artificial Intelligence and Deep Learning
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
…
continue reading
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
…
continue reading
1
Ballistic Hot Dogs, Clayrat, Twonet, Lockbit, Resumes, Discord, Aaran Leyland and... - SWN #519
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
…
continue reading
1
What is TintE ISP? The Game-Changing Image Signal Processor by e-con Systems Explained
5:25
5:25
Play later
Play later
Lists
Like
Liked
5:25🎙️ Welcome to Vision Vitals — your source for insights into the future of embedded vision. In this episode, we break down TintE ISP, e-con Systems’ in-house Image Signal Processor (ISP) built on FPGAs — and explore how it revolutionizes image quality, flexibility, and system performance across industries like robotics, industrial automation, and me…
…
continue reading
1
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
…
continue reading
1
Vite is like the United Nations of JavaScript
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08Ryan welcomes back Evan You, the creator of Vite and Vue.js, to discuss the evolution of build tools in web development, the unique features of Vite from its plugins to its hot module capabilities, and the future of Vite, including its integration with Rust. Plus, they touch on Vite’s new documentary and the power of open-source communities. Episod…
…
continue reading
1
IoT Hacks Galore - Kieran Human - PSW #895
2:09:14
2:09:14
Play later
Play later
Lists
Like
Liked
2:09:14This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
…
continue reading
1
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
…
continue reading
1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading
By CyberSecurity Summary
…
continue reading
1
Bad Crypto, Zombie CPUs, Y2K38,Park Mobile, Redis, Red Hat, Deloitte, Aaran Leyland.. - SWN #518
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47
…
continue reading
1
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52
…
continue reading
By CyberSecurity Summary
…
continue reading
1
Context is king for secure, AI-generated code
28:15
28:15
Play later
Play later
Lists
Like
Liked
28:15Ryan sits down with Dimitri Stiliadis, CTO and co-founder of Endor Labs, to talk about how AppSec is evolving to address AI’s use cases. They discuss the implications of AI-generated code on security practices, the importance of human oversight in managing vulnerabilities, and how organizations should be balancing security and efficiency with AI. E…
…
continue reading
1
AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427
1:34:04
1:34:04
Play later
Play later
Lists
Like
Liked
1:34:04At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
…
continue reading
1
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
…
continue reading