Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Mobile Application Development Podcasts

show episodes
 
Artwork

1
The Stack Overflow Podcast

The Stack Overflow Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
saubhagyam

seosaubhagyam

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are one of Top Rated Python Mobile Application Development Company in India and we also provide services of website development, web designing and mobile application development at the cost effective rates. Contact us today for more information.
  continue reading
 
Artwork

1
Tidbits by LUD

Level Up Development

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We examine the progression of digital technologies, from artificial intelligence to Web 3.0, and discuss how utilizing these advancements can enhance your business operations & revenue in 10 minutes or less. --> https://www.levelupdevelopment.com/
  continue reading
 
Artwork

1
Vision Vitals

e-con Systems

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through its podcasts, e-con Systems aims to discuss vision related topics spanning camera technology, applications of embedded vision, trends in vision enabled devices across multiple industries etc. You will learn about the challenges in integrating cameras into end products and how to overcome them, feature set of cameras used in various applications, how to choose the right camera that perfectly fits your application, and much more.
  continue reading
 
Artwork

1
MAD

Ross Sinnema

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Mobile application development Podcast, sharing valuable information with the engineering community. Interesting guests from all over the world talking about all things mobile development. Hosted by Ross Sinnema from Geo20. The sole purpose is to discuss topics related to mobile application development and help make the information accessible to anyone interested.
  continue reading
 
I love making software. I also love sharing that experience with others. I explore it all in this Podcast, from apps to games and in between. From developers just getting started to professionals. We all have something to learn and share with others on our journey.
  continue reading
 
Explore all the details related to building your Android/iOS mobile application here and get an idea of the hourly hiring charges for different technologies. At Echoinnovate IT - app development company, we’re in the business of providing Innovative Smart IT solutions, connecting people’s ideas for mobile apps with our experienced mobile app developers. In the process, we get lots of questions about app development.
  continue reading
 
Artwork

1
Webmyne

Webmyne

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Webmyne is a leading web application development and mobile app development company based in India having a head office in Canada. We provide the services for custom software development and we are experts in Laravel, Full Stack, and Angular development. We are professionals in developing innovative websites, custom web applications as well as applications for Android and iOS and Digital Marketing. You can also hire a dedicated developer or a team for your projects if you want. Visit https:/ ...
  continue reading
 
In today's highly competitive market of mobile-based applications, identifying an experienced and reliable Android app development company is essential for companies who want to make it in the digital world. iTechnolabs stands out as a reputable and renowned Android application development firm in the USA. With an established track record and a dedication to quality, iTechnolabs has earned a reputation for exceptional Android app development services.
  continue reading
 
Tune-in to ProgrammableWeb Radio to hear ProgrammableWeb.com's editor-in-chief discuss current events regarding Web and Mobile Application Development and the API economy. ProgrammableWeb is regarded as the Web's journal of the API economy and it runs the largest directory of public APIs and SDKs on the Internet.
  continue reading
 
Artwork

1
Development Best Practices

ILM Professional Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Gain insights and tips on best practices for software developers from the Development Best Practices Podcast, brought to you by ILM Professional Services. We’ll have discussions about the best practices in development - from new tools, services and methods you can use today to the larger architecture decisions that will set your path for years to come. Expect good helpings of technical insights mixed in with too many dad jokes. Hosted by Jason Erdahl.
  continue reading
 
Artwork

1
Martinez Duong

Martinez Duong

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Martinez Duong is a seasoned expert in Android development with a Master’s degree from Swinburne University, Australia, and over a decade of experience in the mobile app industry. He has contributed significantly to cutting-edge Android projects and has served as a consultant and author for ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD for the past two years. His deep expertise in app development, combined with his strategic insights in mobile marketing, has made him a key figure in the te ...
  continue reading
 
Artwork
 
World Web Technology is one of the leading website designing & mobile application development company located in India, provides custom software development services worldwide. We are backed by a team of 70+ full-time resources who deliver high-quality business solutions to global clients spanning diverse industry verticals. We have successfully completed over 1000+ projects spanning a wide variety of organizations across a range of industries including Corporations, eCommerce Stores, Not-fo ...
  continue reading
 
Tools and APIs required to build applications for the iPhone and iPad platforms using the iOS SDK. User interface design for mobile devices and unique user interactions using multi-touch technologies. Object-oriented design using model-view-controller paradigm, memory management, Swift programming language. Other topics include: object-oriented database API, animation, mobile device power management, multi-threading, networking and performance considerations.
  continue reading
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Artwork
 
Since its inception in 2011, Best Remote Team, an offshore web and mobile app development company, is offering high-quality offshore software and app development services by facilitating businesses with the right and skilled technical brains. You can hire a remote team of dedicated developers with the right skills and attitude for your project. Hire dedicated developers after a thorough screening process and a personal interview to find the best match as per your expectations.
  continue reading
 
We are a prominent web and mobile app development company and work in tandem with clients offering them the best quality with market relevancy using latest technologies and ongoing trends which let our clients boost their business standing strong in the competitive market. Vrinsoft has been serving its clients from year 2009. Since the inception, we always wanted to give the best of services to our clients, and adhering to this philosophy, we have served so many companies and helped so that ...
  continue reading
 
IndGlobal has extensive experience in providing information technology and digital transformation services with the latest developments in the industry for companies of every size. Focused on Odoo ERP solutions, software development, eCommerce development, mobile applications, web technology, digital marketing, and IoT solutions, we are the number one choice for our esteemed clients worldwide. Having a pool of technological and experienced experts, we are confident to cater to our client's b ...
  continue reading
 
Artwork

1
The Deep Stack Podcast

Defang & Éphémère Creative

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
A podcast where we explore everything in a modern (and not so modern) application stack. Join us as we talk about everything from modern TypeScript to old-school D.lang, Postgres to SQL Server, Heroku to AWS and everything in between, as we break down different apps, their stacks, and architectures.
  continue reading
 
Artwork

1
The Modern Mobility Podcast

Modern Mobility Partners

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This podcast is for transportation planners and enthusiasts who want to learn PRACTICAL SOLUTIONS to modern day transportation challenges. Learn step-by-step how to plan for new and emerging technologies, increasing e-commerce, resiliency, micromobility, and equity, just to name a few. Co-hosts, Keli Kemp and Kirsten Mote, are certified transportation planners, national experts, and thought leaders at Modern Mobility Partners, a female and minority-owned transportation planning and engineeri ...
  continue reading
 
Unity 3D is a fantastic gaming engine for creators that offers a wealth of features and gameplay options. Consider utilizing the Unity 3D game development platform to develop an interactive game that is both fascinating and excellent in its own right. Developing a gaming application will get easier as virtual worlds come to life.
  continue reading
 
Today's applications are increasingly mobile. Computers are no longer confined to desks and laps but instead live in our pockets and hands. This course teaches students how to build mobile apps for Android and iOS, two of today's most popular platforms, and how to deploy them in Android Market and the App Store. Students learn how to write native apps for Android using Eclipse and the Android SDK, how to write native apps for iPhones, iPod touches, and iPads using Xcode and the iOS SDK, and ...
  continue reading
 
A relaxed coffee always brings an insightful conversation. And when it comes to mobile app performance, coffee is always a useful tool. Join us at the App Performance Café, where Rui Costa, CEO at Codavel, brings the most knowledgable individuals for an informal conversation around the vast world of mobile app performance. Our guests will share the challenges and obstacles, strategies, and lessons learned when building top-performing mobile apps. Across multiple episodes, we'll cover the con ...
  continue reading
 
Artwork

1
CEO Jesse Dang

CEO Jesse Dang

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
CEO Jesse Dang, she is the CEO of ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD, is a visionary entrepreneur who co-founded and leads the mobile app promotion company. With a wealth of experience in the Information Technology industry, particularly in application optimization, app promotion, and marketing, she has played a significant role in the company's development and is a trailblazer in the field of app optimization and promotion.
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork
 
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
  continue reading
 
Artwork

1
Wiki Bearings

Hassanein Alwan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to "WIKI Bearings", a podcast brought to you by Mineral Circles Bearings. Whether you're a seasoned industry professional or a curious newcomer, join us as we explore everything you need to know about bearings, from their history and development to their modern-day applications and innovations. Each episode is packed with insightful discussions, expert interviews, and valuable insights into the diverse types of bearings, their functionalities, and their significance across various in ...
  continue reading
 
Artwork

1
Paul Zinah Le

Paul Zinah Le

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Paul Zinah Le is a highly skilled expert in Google Services, specializing in mobile app promotion and Google reviews optimization. With years of experience in the tech industry, Paul has worked on numerous high-impact projects aimed at boosting app visibility and driving engagement through Google campaigns and reviews management. She holds a Master’s degree from Halifax, Nova Scotia, Canada, and is currently an author and consultant for ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD Global, ...
  continue reading
 
Artwork

1
Daniel Garcy Lee

Daniel Garcy Lee

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Daniel Garcy Lee is an accomplished MacOS expert with a wealth of experience in the field. Holding a Master’s degree from The University of Manchester, Daniel has worked on numerous high-impact MacOS projects, contributing to the development of cutting-edge applications. His extensive knowledge of MacOS, combined with his experience in teaching and training, has made him a key player at ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD, where he has significantly advanced the company's MacOS o ...
  continue reading
 
Artwork

4
Tech Connect

Catapult Systems

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Tech Connect is your go-to podcast for all things IT. We'll discuss cutting edge technology as well as historical trends within the industry. We love to hear from our listeners, so reach out if you have an idea for a future podcast or if you just want to say hello. Catapult Systems is an IT consulting company that offers a full spectrum of services including application development, software integration, infrastructure, managed services, user centered design solutions and enterprise mobile a ...
  continue reading
 
Artwork

1
Heal Your Body, Mind, Emotions, and Spirit

Hanna Maria - Certified Life Coach and Emotional Healing Expert

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
A show about healing your body, spirit, mind and emotions. Led by the International Speaker and Life Coach Hanna, we feature a variety of content and interviews that will make you feel good and look good - from emotional and spiritual wellness to the cutting edge news in health. Hanna is a successful Personal and Executive Coach, COO of a Mobile Application Development company, and a Corporate Adviser.
  continue reading
 
Artwork

1
Johnson Tran Hoang

Johnson Tran Hoang

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Johnson Tran Hoang is a distinguished iOS expert with an extensive background in developing, promoting, and optimizing iOS applications and software solutions. With a rich blend of academic rigor and industry expertise, Johnson Tran Hoang has made substantial contributions to ASOSERVICE MOBILE APPLICATION PROMOTION CO.,LTD, a leading company specializing in app and software promotion. His leadership and technical acumen have driven ASOServices to become a key player in the global app develop ...
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
XDuce Corporation

XDuce Corporation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
XDuce provide develop solutions that help businesses expand enhance productivity and strengthen data security. We deliver software development and enterprise app development for banking, insurance, healthcare, and non-profit industries.
  continue reading
 
Artwork

1
Robotics 24/7 Podcast

Robotics 24/7, a division of Peerless Media LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Robotics 24/7 is your source for news and discussion about the latest developments in automation, including mobile robots, collaborative robots, and industrial systems. This podcast is designed to inform end users, integrators, suppliers, and developers of practical, commercial robotics applications.
  continue reading
 
Artwork

1
The Decision Intelligence Lab

The Decision Intelligence Lab

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Decision Intelligence Lab explores practical challenges of applying data science, analytics, and AI to drive real-world business outcomes. Hosted by Prof. Michael Watson (Northwestern University) and Prof. Vijay Mehrotra (University of San Francisco) — both seasoned entrepreneurs, consultants, and researchers — this podcast delivers real-world insights for data professionals, business leaders, & anyone seeking to leverage data for smarter decision making. Each episode features leaders sh ...
  continue reading
 
Artwork

1
Sonia Randhawa

Sonia Randhawa

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Sonia Randhawa is a Senior Technology Executive. She coordinates innovation and functional advancement across organizations and manages key associations, merges and acquisitions, the incorporation of new plans of action, the incubation of new advances, and the development of elite specialized ability. Sonia Randhawa has held several influential positions at IBM, Nokia Networks/Alcatel-Lucent, F5 Networks and Intel Corporation. https://www.crunchbase.com/person/sonia-randhawa https://www.soni ...
  continue reading
 
Artwork

1
Audcode

Mahmoud Ramadan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Audcode provides a quick Arabic summary for technical content (audio, video, articles, books) to keep yourself updated. The summary is provided from developers to developers.
  continue reading
 
Loading …
show series
 
A comprehensive exploration of mobile network technologies, detailing the evolution from GSM and UMTS to LTE and 5G New Radio. It outlines the intricate architecture, protocols, and operational procedures that underpin these wireless communication systems, including channel structures, mobility management, and call establishment. Furthermore, the t…
  continue reading
 
Provides an extensive overview of modern cybersecurity strategies, emphasizing the evolving role of the Chief Information Security Officer (CISO) from a technical expert to a strategic business leader. It covers critical aspects such as building a culture of security, managing diverse threat actors (nation-states, cybercriminals, hacktivists, and i…
  continue reading
 
Venomous Robo Bees and Rabid Cocaine Weasels, sidebar spoofing, AI Risk, Red Tiger, SessionReaper, Bad Bots, Willow, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-523
  continue reading
 
How do Autonomous Mobile Robots (AMRs) perceive the world around them? In this episode of Vision Vitals - e-con Systems Podcast, we dive deep into how Time of Flight (ToF) technology enables AMRs to “see” in 3D — helping them navigate complex environments safely and intelligently. 🎙️ In this episode: What Time of Flight cameras are and how they wor…
  continue reading
 
Serves as an in-depth guide to Secure Access Service Edge (SASE). It explores the evolution of network security from traditional WANs to modern, cloud-centric architectures, emphasizing the need for SASE in today's distributed and dynamic enterprise environments. The source details SASE's foundational components, including SD-WAN, various security …
  continue reading
 
Ryan is joined by Spiros Xanthos, CEO and founder of Resolve AI, to talk about the future of AI agents in incident management and troubleshooting, the challenges of maintaining complex software systems with traditional runbooks, and the changing role of developers in an AI-driven world. Episode notes: Resolve AI is building agents to help you troub…
  continue reading
 
In the security news: When in doubt, blame DNS, you're almost always correct How to Make Windows 11 great, or at least suck less CSRF is the least of your problems Shady exploits Linux security table stakes (not steaks) The pill camera Give AI access to your UART Security products that actually try to be secure? Firmware vulnerabilities, lots of th…
  continue reading
 
A field guide for designing, building, and assessing machine learning and AI systems. The book addresses the risks of AI failures, such as algorithmic discrimination and data privacy violations, which have become more common with wider adoption of ML technologies. It outlines a holistic approach to risk mitigation, combining technical practices, bu…
  continue reading
 
In this episode of Leaders of Code, Eira May, B2B Editor at Stack Overflow, and Natalie Rotnov, Senior Product Marketing Manager for the Enterprise Product Suite at Stack Overflow, unpack the key takeaways from the 2025 Developer Survey for tech and business leaders. The discussion focuses on the evolving developer relationship with AI, the continu…
  continue reading
 
As the Verizon Data Breach Investigations Report has stated year after year, most breaches start with human error. We've invested a lot in Security Awareness and Training and Phishing solutions, but yet human error is still the top risk. How do we actually reduce human risk? Rinki Sethi, CSO at Upwind Security, and Nicole Jiang, CEO of Fable Securi…
  continue reading
 
Explores the integration of ITIL (Information Technology Infrastructure Library) principles with DevOps methodologies, offering innovative techniques for their combined application. It provides an in-depth look at ITIL's foundational concepts, including service lifecycle phases like strategy, design, transition, and operation, alongside essential p…
  continue reading
 
The Afterlife, AWS, ClickFix, Agentic AI Galore, Robot Lumberjacks, Robocalls, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-522 This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn mor…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
An introductory guide to cybersecurity and ethical hacking using Python. It covers fundamental concepts such as network basics, the CIA triad (Confidentiality, Integrity, and Availability), and different types of hackers, including black hat, white hat, and script kiddies. The book outlines the phases and methodologies of hacking, from reconnaissan…
  continue reading
 
Ryan welcomes John Dickerson, CEO of Mozilla.ai, to talk about the evolving landscape of AI agents, the role of open source in keeping the tech ecosystem healthy, the challenges OS communities have faced with the rise of AI, and the implications of data privacy and user choice in the age of multi-agent AI systems. Episode notes: Mozilla.ai is build…
  continue reading
 
Segment 1: David Brauchler on AI attacks and stopping them David Brauchler says AI red teaming has proven that eliminating prompt injection is a lost cause. And many developers inadvertently introduce serious threat vectors into their applications – risks they must later eliminate before they become ingrained across application stacks. NCC Group’s …
  continue reading
 
Explores various facets of opportunistic networks (OppNets), which are dynamic, infrastructure-less wireless networks leveraging mobile device interactions for data transfer, often via a "store-carry-forward" mechanism. It details different routing protocols, categorizing them by approaches like replication-based (e.g., Epidemic, Spray and Wait), s…
  continue reading
 
A comprehensive guide to enhancing network security using open-source tools. It begins by emphasizing the importance of strong password management and multi-factor authentication, before moving into detailed discussions of firewall configuration for network perimeter defense. The text then explores Host Intrusion Detection Systems (HIDS) for server…
  continue reading
 
Explores the multifaceted field of network science, detailing various network types such as social, biological, and technological systems like the Internet and telephone networks. It examines fundamental network properties including paths, connectivity, and the small-world effect, alongside different mathematical representations of networks. The so…
  continue reading
 
In this episode, Mazen Chami sits down with Mustafa Ali (Director of Engineering and Head of Mobile at Shopify) and Thiago Magalhães (Staff Software Developer at Shopify) to dive deep into Shopify’s transition to the new React Native architecture. Show Notes Shopify Blog: Migrating to React Native's New Architecture by Thiago Magalhaes RNR 319: Sho…
  continue reading
 
n this episode of Vision Vitals by e-con Systems, we explore how camera technology shapes the navigation, perception, and safety of Autonomous Mobile Robots (AMRs). From SLAM-based navigation to real-time obstacle detection, the right camera setup determines how intelligently and safely an AMR can operate. Tune in to learn: Why AMRs depend on globa…
  continue reading
 
Explores various facets of network security and performance, providing practical guidance for hardening systems and optimizing network elements. It covers topics such as client and server security configurations, including detailed steps for Windows and Linux environments, and the benefits of virtualization for disaster recovery and elastic perform…
  continue reading
 
Andrei Kvapil, founder of Ænix and core developer of Cozystack, joins Ryan to dive into what it takes to build a cloud from scratch, the intricacies of Kubernetes and virtualization, and how open-source has made digital sovereignty possible. Episode notes: Cozystack is a Kubernetes-based framework for building a private cloud environment. Connect w…
  continue reading
 
First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and explo…
  continue reading
 
An extensive guide to Mastering Tableau, a prominent business intelligence tool, focusing on its advanced features for data analysis and visualization. It covers best practices for visual design, including formatting, color usage, and reducing clutter to create impactful data stories. Readers will learn about data preparation and handling using Tab…
  continue reading
 
Still managing compliance in a spreadsheet? Don't have enough time or resources to verify your control or risk posture? And you wonder why you can't get the budget to move your compliance and risk programs forward. Maybe it's time for a different approach. Trevor Horwitz, Founder and CISO at TrustNet joins Business Security Weekly to discuss how th…
  continue reading
 
Detailing its installation, configuration, and management for various IT infrastructure needs. It covers fundamental concepts like server roles, disk management, networking protocols, and PowerShell cmdlets for administration. The text also thoroughly explores advanced topics such as virtualization with Hyper-V, including virtual disks, networks, a…
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
An introduction to Power BI, outlining its use in business intelligence applications. It covers fundamental concepts like data modeling, DAX calculations, and various visualization types such as bar, line, waterfall, scatter, donut, treemap, and map charts. The text also explains how to connect and shape data from diverse sources using Power Query …
  continue reading
 
Ryan welcomes Dhruv Batra, co-founder and chief scientist at Yutori, to explore the future of AI agents, how AI usage is changing the way people interact with advertisements and the web as a whole, and the challenges that proactive AI agents may face when being integrated into workflows and personal internet use. Episode notes: Yutori is building A…
  continue reading
 
Segment 1 - Interview with Dr. Anand Singh We're always thrilled to have authors join us to discuss their new book releases, and this week, it is Dr. Anand Singh. He seriously hustled to get his new book, Data Security in the Age of AI, out as soon as possible so that it could help folks dealing with securing AI rollouts right now! We'll discuss wh…
  continue reading
 
A practical resource for developing, deploying, and scaling containerized applications. It covers fundamental concepts like containerization versus virtual machines, Kubernetes architecture, and various Azure container services, alongside advanced topics such as serverless Kubernetes, Windows containers, and integrating with Azure DevOps for contin…
  continue reading
 
Discuss artificial intelligence and deep learning techniques applied to malware analysis and detection, as well as other cybersecurity challenges. They cover various neural network architectures like MLPs, CNNs, RNNs, LSTMs, and GANs, and their effectiveness in tasks such as classifying malware families, identifying malicious URLs, and detecting an…
  continue reading
 
A comprehensive guide to the security architecture of mobile telecommunications systems, particularly focusing on Long Term Evolution (LTE). It details the evolution of cellular security from analogue systems to 2G (GSM), 3G (UMTS), and the Evolved Packet System (EPS), highlighting common vulnerabilities and subsequent design improvements. The text…
  continue reading
 
Ballistic Hot Dogs, Sonicwall, Clayrat, Twonet, Lockbit, Breachforums, Resumes, Discord, Aaran Leyland, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-519
  continue reading
 
🎙️ Welcome to Vision Vitals — your source for insights into the future of embedded vision. In this episode, we break down TintE ISP, e-con Systems’ in-house Image Signal Processor (ISP) built on FPGAs — and explore how it revolutionizes image quality, flexibility, and system performance across industries like robotics, industrial automation, and me…
  continue reading
 
A practical guide to Narrowband Internet of Things (NB-IoT), detailing its underlying cellular communication technologies like 4G and 5G LTE, and its applications in Machine Type Communication (MTC). The text covers Arduino-based projects for developers, showcasing the use of an NB-IoT hardware board with a microcontroller (MCU) and Quectel BG96 mo…
  continue reading
 
Ryan welcomes back Evan You, the creator of Vite and Vue.js, to discuss the evolution of build tools in web development, the unique features of Vite from its plugins to its hot module capabilities, and the future of Vite, including its integration with Rust. Plus, they touch on Vite’s new documentary and the power of open-source communities. Episod…
  continue reading
 
This week we kick things off with a special interview: Kieran Human from Threat Locker talks about EDR bypasses and other special projects. In the security news: Hacking TVs Flushable wipes are not the only problem People just want to spy on their pets, except the devices can be hacked Linux EDR is for the birds What does my hat say we love exploit…
  continue reading
 
A comprehensive guide to the LLVM compiler infrastructure. It covers various aspects of LLVM, including its build system, testing utilities like LIT, and the domain-specific language TableGen. The text explores frontend development with Clang, explaining its architecture, preprocessing, Abstract Syntax Tree (AST) handling, and custom toolchain crea…
  continue reading
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
Ryan sits down with Dimitri Stiliadis, CTO and co-founder of Endor Labs, to talk about how AppSec is evolving to address AI’s use cases. They discuss the implications of AI-generated code on security practices, the importance of human oversight in managing vulnerabilities, and how organizations should be balancing security and efficiency with AI. E…
  continue reading
 
At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
  continue reading
 
Serves as a comprehensive interview guide for Java professionals, covering a wide array of topics essential for technical interviews. It begins by outlining non-technical aspects of job searching, such as recruitment processes, interview types (telephonic, technical, personal), and strategies for success, including resume preparation and soft skill…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play