Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Open Source Security Podcasts
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There's a lot of good work happening that doesn't get attention because there's no marketing department behind it, they don't have a developer relations team posting on LinkedIn every two hours. Let's focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The Angular Plus Show is the home of ng-conf's official all-Angular podcast. Come here to stay up to date on the latest changes in the Angular community. Expect to laugh and cry with us as we talk about our experiences as Angular developers.
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
Hi, we’re Tim Berglund, Adi Polak, and Viktor Gamov and we’re excited to bring you the Confluent Developer podcast (formerly “Streaming Audio.”) Our hand-crafted weekly episodes feature in-depth interviews with our community of software developers (actual human beings - not AI) talking about some of the most interesting challenges they’ve faced in their careers. We aim to explore the conditions that gave rise to each person’s technical hurdles, as well as how their experiences transformed th ...
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig into open source, enterprise IT, and cybersecurity without the jargon. Each episode blends real-world stories, practical insights, and a bit of geeky humor to keep sysadmins, developers, IT leaders, and open-source enthusiasts informed and inspired.
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
The FINOS Open Source in Finance Podcast celebrates open source projects and interesting topics at the cross section of financial services and open source. So far, our industry experts have discussed practical applications of and their real-world experiences with a range of open source projects including desktop interoperability, low code platforms, synthetic data, and data modeling. They’ve also discussed best practices for inner source, common myths about open source and why commercial com ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Compiler gives you perspectives and insights from the tech industry—free from jargon and judgment. We’re here to help tech newbies understand what’s going on. Learn more about our show at redhat.com/en/compiler-podcast
…
continue reading
Each episode of Discursive takes one idea — from open source to FinOps, from AI agents to cloud cost models — and unpacks it through the lens of decades spent building the web, scaling infrastructure, and writing about how technology actually evolves. Recorded in Seattle, Discursive is a ten-minute conversation about where software has been and where it’s heading — across cloud, FinOps, open source, AI, and the culture that connects them.
…
continue reading
801
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Podcast on enterprise technologies including cloud native, GenAI, Security, Data Protection and more.
…
continue reading
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Open source is different. How different would the world be if we used open source concepts more widely? This micro podcast looks at the open source philosophy and how open source can change the world. Each episode is just over two minutes long. Watch video versions on YouTube and Twitter.
…
continue reading
IT Talks (produced by Redpill Linpro) lets you in on how it is to work with us, how customers have solved IT challenges, the open source perspective, new industry trends by our partners, and much more. We have offices in Denmark, Norway, and Sweden – and we have recorded talks at all of our locations and the chats are held in local language.
…
continue reading
1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
The podcast of foojay.io, a central resource for the Java community’s daily information needs, a place for friends of OpenJDK, and a community platform for the Java ecosystem — bringing together and helping Java professionals everywhere.
…
continue reading
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
…
continue reading
Welcome to Opt Out, where I sit down with passionate people to learn why privacy matters to them, the tools and techniques they’ve found and leveraged, and where we encourage and inspire others towards personal privacy and data-sovereignty.
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
Interviews with interesting people in the devtools space. From security to dev focused infrastructure, and from homomorphic encryption to privacy and decentralization, we discuss the technical details around devtools.
…
continue reading
All Things LLM is your go-to podcast for demystifying Large Language Models! We break down their core concepts—like tokens, embeddings, and the self-attention that powers GPT-4 and Llama. Learn how LLMs are built, trained, and fine-tuned (SFT, RLHF, PEFT) on massive datasets. Discover real-world use cases in healthcare, finance, chatbots, code, RAG, and more. We explore the LLM ecosystem, covering open-source vs. closed models, LLMaaS, LangChain, and LLMOps tools. Plus, we tackle challenges— ...
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
1
A Deep Dive into the Open Source Project Security (OSPS) Baseline
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57In this episode of "What's in the SOSS," CRob, Ben Cotton, and Eddie Knight discuss the Open Source Project Security Baseline. This baseline provides a common language and control catalog for software security, enabling maintainers to demonstrate their project's security posture and fostering confidence in open source projects. They explore its int…
…
continue reading
1
Detecting XZ in Debian with Otto Kekäläinen
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48In this episode, Josh and Otto dive into the world of Debian packaging, exploring the challenges of supply chain security and the importance of transparency in open source projects. They discuss Otto's blog post about the XZ backdoor and how it's a nearly impossible attack to detect. Otto does a great job breaking down an incredibly complex problem…
…
continue reading
1
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx In this episode of the Security Repo Podcast, François Proulx, VP of Security Research at Boost Security, discusses the evolving threats in software supply chain security, particularly focusing on attacks targeting CI/CD pipelines. He explains how open source tools li…
…
continue reading
1
Turn CCC into Real Checks: Multi-Cloud Security with Prowler + AI (OSFF NY Preview)
22:18
22:18
Play later
Play later
Lists
Like
Liked
22:18🚀 Get a sneak peek of how FINOS Common Cloud Controls (CCC) can move from policy docs to practical enforcement—through automation and open source.In this clip:Toni de la Fuente, Founder & CEO, ProwlerToni shares his journey from maintaining open source in his spare time to helping the community align cloud security with real frameworks like CCC. He…
…
continue reading
1
The Incredible Machine: When Corporate Theater Met the Dawn of Unix
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24"The Incredible Machine" was Bell Labs' 1968 promotional masterpiece—complete with scientists in full suits, dramatic red lighting, and demonstrations of light pens drawing circuits on graphics displays. The film showcased computer-generated music and the iconic "Daisy Bell" performance that inspired HAL 9000 in "2001: A Space Odyssey." It was corp…
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
Today's Tech News: Massive Credential Breach, Meta's Rust-Powered Type Checker, and the End of an Era
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22Troy Hunt has processed the largest data breach corpus in Have I Been Pwned's history—nearly 2 billion unique email addresses and 1.3 billion passwords, with 625 million passwords never seen before. This isn't a single breach but rather credential stuffing data that criminals use to attempt logins across the internet. The scale is staggering: 32 mi…
…
continue reading
1
CISO Perspectives: Navigating the Security Landscape in 2025
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21In a world where cyber risk is business risk, today's Chief Information Security Officers are not just defenders of data—they are strategic partners driving organizational resilience. Moderated by Gartner's Ash Ahuja, this candid conversation explores how security leaders are balancing innovation with risk management, influencing board-level decisi…
…
continue reading
1
263 Why European tech services should be your first choice
29:39
29:39
Play later
Play later
Lists
Like
Liked
29:39Guests: Endre Dingsør and Paal Hatledal Language: Norwegian Duration: 29:38 min In this episode, Endre Dingsør from Choose European and Redpill Linpro's Paal Hatledal discuss the importance of choosing European tech services instead of overseas providers. Investing in domestic technology not only saves money but also strengthens local competence. E…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
Developers, It's Time to Secure Your Workstations and Laptops
50:41
50:41
Play later
Play later
Lists
Like
Liked
50:41Developer workstations have become treasure chests of credentials—API keys, database passwords, cloud tokens, SSH keys—essentially the keys to the kingdom. This episode examines why developers have become the softest target in the security landscape, with surveys showing 86% of developers don't prioritize security when writing code, and nearly one-…
…
continue reading
1
S10 E10 | Boom, Boom, Boom, Badoom: We Got that Supabase with Katerina Skroumpelou
51:00
51:00
Play later
Play later
Lists
Like
Liked
51:00In this episode, Katerina Skroumpelou joins us to talk all things Supabase — from what it is and how it simplifies life for everyday developers to why Angular devs are starting to love it. We chat about real-world use cases, security best practices, and how Katerina keeps learning new tools with confidence and curiosity. She also opens up about sta…
…
continue reading
Once the king of VPNs, ExpressVPN has seen a dramatic fall of grace that started in 2021. This is the story of the rise and fall of one of the most well-known privacy and security apps. Start protecting your own online identity with our free email course: https://www.allthingssecured.com/email-course/ Recommended alternatives to ExpressVPN (affilia…
…
continue reading
1
Git's Discontents: Examining the Cracks in Version Control's Crown
57:36
57:36
Play later
Play later
Lists
Like
Liked
57:36Git fundamentally transformed software development, enabling the open-source explosion we've witnessed over the past two decades. But as we approach Git's 20th birthday, it's worth examining where this beloved tool shows its age. Today's main segment digs into three key areas of discontent: Git's well-documented struggles with massive monorepos (fo…
…
continue reading
1
Yield Basis: Disrupting Defi & Bitcoin Yield
1:00:05
1:00:05
Play later
Play later
Lists
Like
Liked
1:00:05Brian Fabian Crain and Michael Egorov, Curve Finance founder, discuss Curve's origins: solving inefficient DAI/USDC swaps after MakerDAO borrows by creating a DeFi AMM for stablecoins and LSTs. It hit 1M TVL with a bonding curve concentrating liquidity at 1:1, more effective for pegged assets than Uniswap. Features grew to include BTC wrappers, stE…
…
continue reading
1
Mapping the InfoSec Community: Building InfoSecMap & Global Security Events – Martín Villalba
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04In this episode of the Security Repo Podcast, we sit down with Martín Villalba, founder of InfoSecMap, to explore how his platform is transforming the way InfoSec professionals discover global events, communities, and CFPs. We dive into the origin story of InfoSecMap, its recent growth surge, and its strategic partnerships with organizations like O…
…
continue reading
1
Embedded Executive: Get All Your AI In One Place | Analog Devices
11:28
11:28
Play later
Play later
Lists
Like
Liked
11:28There are lots of semiconductor vendors that do a great job of providing AI hardware. But unfortunately, for many of them, their offerings end there, requiring developers to source software and tools from multiple sources. It’s no secret that designing a system with AI is complex enough. Having to go to different vendors for different pieces just a…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Driving healthcare discoveries with AI ft. Jianying Hu
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30We often hear about AI's potential to generate text and code, but its application in healthcare and life sciences promises a more profound impact: solving our most fundamental challenges in disease and medicine. This isn't just about applying existing LLMs; it's about building entirely new foundation models that understand the complex language of b…
…
continue reading
1
Trusting the Autopilot: When AI Flies Better Than Humans
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28Modern aviation has a counterintuitive rule: keep the autopilot engaged during turbulence. After analyzing millions of flights, Airbus found that pilots who disconnect autopilot often make things worse through overcorrection and startle response. The machine, monitoring 88+ parameters simultaneously, handles the chaos better than human instinct. Th…
…
continue reading
1
Rethinking Software Security Compliance in the Age of AI with Nick Selby
56:51
56:51
Play later
Play later
Lists
Like
Liked
56:51In this episode of "Nerding Out with Viktor," host Viktor Petersson sits down with Nick Selby, a security leader and advocate for practical security culture, to explore the reality behind software security compliance and why so many teams treat it as a checkbox rather than a mindset. The discussion unpacks how frameworks like SOC 2 and ISO 27001 of…
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
A quick introduction to Verbose Mode, the podcast from the team at TuxCare. Host Eric “The IT Guy” Hendricks shares what the show’s all about — real conversations about Linux, open source, and enterprise IT without the buzzwords or fluff. Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig…
…
continue reading
1
A Conservative Agenda for American Science Policy w/Ian Banks
56:45
56:45
Play later
Play later
Lists
Like
Liked
56:45For three decades, conservatives abandoned science policy. Now they have a chance to rebuild it. That rebuilding effort comes with political challenges. Republicans' trust in science dropped thirty points over those decades. DOGE recently slashed budgets at the National Science Foundation and National Institutes of Health. And HHS Sec RFK jr. is ca…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Scaling AI in Engineering with Peter Bell | Ep. 7
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16Listen: https://confluent.buzzsprout.com | Today, Adi Polak talks to her guest, Peter Bell (gather.dev), about his career in software engineering leadership, CTO community building, and AI-driven development. Peter’s first job: electronics lab technician at their school (alongside shifts at Tesco). His challenge/theme: working at scale with AI adop…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
#744: Amazon Bedrock AgentCore, Amazon EC2 Capacity Manager, and so much more!
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Simon and Jillian walk you through all the new and interesting updates.By Amazon Web Services
…
continue reading
1
Meteors vs. Data Centers - Cloud Computing: Worst Case Scenarios
51:37
51:37
Play later
Play later
Lists
Like
Liked
51:37The October 2025 AWS outage in us-east-1 was a 15-hour preview of life without the cloud. When a DNS resolution failure cascaded through DynamoDB, it didn't just take down websites – it disrupted daily life in unexpected ways. From Starbucks' mobile ordering to smart mattresses stuck at the wrong temperature, the outage revealed how deeply cloud in…
…
continue reading
1
NC #1069 Unite is Accessible, Shell Script for Rounded Border Screenshots, Shure MV7+ by Eddie, Nits with Allister Jenks
54:57
54:57
Play later
Play later
Lists
Like
Liked
54:57Update: Unite is Accessible Rounded Screenshots Part 2 — Rolling my Own and Shottr Update Shure MV7+ Microphone — by Eddie Tonkoi Support the Show Allister on Nitpicking (no blog post) Transcript of NC_2025_10_02 Join the Conversation: [email protected] podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donatio…
…
continue reading
The main segment explores a milestone for the web platform: the Glasgow Haskell Compiler (GHC) now runs entirely in modern browsers via WebAssembly (Wasm). Developers can write, compile, and run Haskell without any local setup, lowering the barrier to entry for education and experimentation. Wasm provides a portable, memory‑safe execution sandbox t…
…
continue reading
TORCHLIGHT, a research tool presented at USENIX Security 2025, discovered 29 zero-day exploits affecting 12.71 million IoT devices hidden on the Tor network by analyzing 26 terabytes of traffic over twelve months. These aren't just smart fridges—they're industrial controllers, security cameras, and network equipment controlling critical infrastruct…
…
continue reading
For our Halloween finale, Carolyn Ford invites two favorite “AI conjurers”, Dave Egts “Mr. X,” public-sector field CTO at Mulesoft, and Laura Klebanow, founder & chief storyteller at Show & Tell, into the Tech Transforms cauldron. Each brings a “secret AI ingredient”: Carolyn composes whimsical Suno-generated theme music (after a prompt-crafting de…
…
continue reading
1
#526: Building Data Science with Foundation LLM Models
1:07:24
1:07:24
Play later
Play later
Lists
Like
Liked
1:07:24Today, we’re talking about building real AI products with foundation models. Not toy demos, not vibes. We’ll get into the boring dashboards that save launches, evals that change your mind, and the shift from analyst to AI app builder. Our guide is Hugo Bowne-Anderson, educator, podcaster, and data scientist, who’s been in the trenches from scalable…
…
continue reading
1
Maven 4 - The Future of Java Build Automation (#81)
1:06:59
1:06:59
Play later
Play later
Lists
Like
Liked
1:06:59Maven 4 is approaching its release, bringing many improvements to the build tool powering millions of Java projects. In this Foojay Podcast episode, we talk about Apache Maven 4, a significant milestone that has been years in the making. Maven has been the backbone of Java dependency management and build automation since the early 2000s; however, t…
…
continue reading
1
Q&A: Why Don't People Care About Privacy?
33:30
33:30
Play later
Play later
Lists
Like
Liked
33:30Q&A243: Why don't people care about privacy? Is it true Proton is accepting Monero? How can you get involved in the fight for privacy? And more! Join our next Q&A on Patreon: https://www.patreon.com/collection/415684?view=expanded or XMR Chat: https://xmrchat.com/surveillancepod Welcome to the Surveillance Report Q&A - featuring Techlore & The New …
…
continue reading
1
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen - Rob Allen - SWN #525
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
…
continue reading
1
DHH on Leaving the Cloud: When Private Infrastructure Makes Sense
23:24
23:24
Play later
Play later
Lists
Like
Liked
23:24DHH's decision to move Basecamp and HEY out of the public cloud sparked intense debate in the tech community. Still, as someone who interviewed him back in 2008 (which ended with us literally running from Chicago police over a filming permit), I respect his position: real numbers and real success back his argument. For mature applications with pred…
…
continue reading
Guest: Thea Stark Language: Norwegian Duration: 18:21 min Thea is a former participant in our DevOps Academy. Today, she works as a system administrator, platform engineer, and (self-proclaimed) Linux nerd. She describes her role as a bridge between development and operations. In this episode of IT Talks, Thea shares insights into her work - the hi…
…
continue reading
51
S10 E9 | A+ Game Show Live at ng-conf 2025
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31Live from ng-conf 2025 — The Angular Plus Show! Join us for our annual game show episode where we show our Angular terminology prowess - or the lack thereof. With special guests: Michael Small & Alex Okrushko (volunteers from the audience), Chau Tran and Ankita Sood (former A+ Show hosts), Kirill Cherkashin from the Google Angular team, and our ver…
…
continue reading
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
…
continue reading
1
The Reality of Utilization Reports: Why FinOps Is More Complicated Than That
24:56
24:56
Play later
Play later
Lists
Like
Liked
24:56In the main segment, Tim unpacks the deceptive nature of utilization reports that FinOps teams rely on to identify "waste" in infrastructure. While industry statistics show servers running at shockingly low utilization rates—often 12-50%—Tim argues that acting on these numbers without context is like "performing surgery with a chainsaw." He explore…
…
continue reading
1
Lamina1: Building The Future of The Creator Economy
59:47
59:47
Play later
Play later
Lists
Like
Liked
59:47Sci-fi titan Neal Stephenson, whose Snow Crash coined the term 'metaverse' and Cryptonomicon, which foreshadowed crypto in 1999, joins Friederike to discuss his "hard sci-fi" method: building immersive, consistent worlds, not prophecy. He's now co-founder of Lamina1, aiming to restore Web1's ethos and give creators IP sovereignty with direct microp…
…
continue reading
In the main segment, we unpack “The Humble Programmer” (1972) and why it still reads like a briefing for 2025. Dijkstra’s claim that “programming will remain very difficult” lands squarely in the age of AI code generation: as tools remove circumstantial cumbersomeness, our ambitions expand and the problems get harder. We connect his call to “prepar…
…
continue reading
101
Emergence of the Chief Trust Officer as CISOs Earn Business Respect and Agenda Shifts - Jeff Pollard - BSW #419
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
…
continue reading
1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
continue reading