Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Protocols Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
Trust is unraveling—institutions falter, headlines deceive, and centralized power’s grip is weakening. A new reality’s emerging: pioneers building on open protocols and technologies are rewriting the rules. From cypherpunks to business leaders, we unpack how economies and societies are shifting.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
Blockcast delivers unfiltered analysis of crypto's most compelling narratives. Each week, seasoned industry insider Takatoshi Shibayama sits down with founders, CEOs, and key players shaping the blockchain landscape to dissect emerging projects, market dynamics, and institutional moves. From trending protocols to strategic industry shifts, get an insider's take on the forces driving decentralized innovation and the decisions that matter. No fluff, no hype—just deep dives into what's really h ...
…
continue reading
here i uh think and stuff about Grapheneos i forgot i have a Peertube site i run freedom.fossfarmers.company https://www.youtube.com/@notafbihoneypot8487 send me xmr 46toA11xGi15Zo3LnGdMjL9GJTPavic3EdderjyE7aU9KGFK38mZv1YSmjo8RoKPRohjRtubkiFxL3bVXABT7N2ZBdDocLD here is my link stack! https://glowinglist.linksta.cc/@notafbihoneypot.bsky.social my blog (still being worked on) blog.notafbihoneypot.com
…
continue reading
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
…
continue reading

1
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Get exam-ready with the BareMetalCyber Audio Course, your on-demand guide to conquering the CompTIA Cloud+ (CV0-003). Each episode transforms complex topics like cloud design, deployment, security, and troubleshooting into clear, engaging lessons you can apply immediately. Produced by BareMetalCyber.com, where you’ll also find more prepcasts, books, and tools to fuel your certification success.
…
continue reading
Technical interviews about software topics.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
The EdgeVerse Techcast goal is to increase awareness of resources available for customers developing with NXP Application Processors and Microcontrollers.
…
continue reading
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
This podcast features all things related to Information Security and Cyber Security
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
We bring you manufacturing news, insights, discuss opportunities, and cutting edge technologies. Our goal is to inform, educate, and inspire leaders and workers in manufacturing, automation, and related fields.
…
continue reading
Join Scott Hanselman every Friday as he engages one-on-one with the engineers who build the services that power Microsoft Azure as they demo capabilities, answer Scott's questions, and share their insights. Follow us at: friday.azure.com.
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Face-to-face with the most important people in digital assets. Explore: https://therollup.co/
…
continue reading
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
…
continue reading
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
This is a podcast for the deeply online, where we chat about all things tech, crypto, and pop culture news. Brought to you by Boys Club, a NY-based media and creative studio, and hosted by Deana Burke and Natasha Hoskins. Have questions? So do we.
…
continue reading
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
…
continue reading
Health Unchained dives into healthcare projects enabled by blockchain technology. Listen to healthcare leaders, executives, entrepreneurs, researchers, and medical professionals who share their insights and experience.
…
continue reading
Learn the latest futurism updates in the tech world.
…
continue reading
Your Microsoft Cloud News from a couple of IT Pros
…
continue reading
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
…
continue reading
Exploring cross-chain composability in a multi-chain world. Composable is a bi-weekly podcast hosted by Alysia and Ellie. Brought to you by Espresso Pods.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Breaking Point – Tensions at Home and Abroad March 18, 2025 | Your Voice – Voices of America Podcast Good morning, America! Today’s episode of Your Voice delivers the stories shaping our world—from escalating conflicts overseas to major political shake-ups right here at home. Buckle up, because this one’s packed with breaking news, critical insights, and the bold discussions you’ve come to expect. 🔥 Middle East on Edge: Overnight Israeli airstrikes hit multiple targets in Gaza following rene ...
…
continue reading
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
…
continue reading
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and operational efficiency. Equipped with advanced sensors, TempGenius monitors critical metrics including temperature, humidity, air pressure, CO₂ leve ...
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
In this video Minnie talks about the Metadata Security Protocol security feature on Azure Instance Metadata Service that helps mitigate security risks by only allowing authenticated applications to communicate with the Host endpoints. Chapters 00:00 - Introduction 01:46 - How Metadata Security Protocol works with Azure Instance Metadata 02:49 - Sta…
…
continue reading

1
The Rollup TV: Friday, September 19th
2:41:24
2:41:24
Play later
Play later
Lists
Like
Liked
2:41:24The Rollup TV is brought to you by: Boundless: https://beboundless.xyz/ AltLayer: https://www.altlayer.io/ Vertex: https://vertexprotocol.com/ Subsquid: https://www.sqd.ai/ Join The Rollup Family: Website: https://therollup.co/ Spotify: https://open.spotify.com/show/1P6ZeYd.. Podcast: https://therollup.co/category/podcast Follow us on X: https://ww…
…
continue reading

1
Mastodon has a new plan to make money: Hosting and support services for the open social web
4:00
4:00
Play later
Play later
Lists
Like
Liked
4:00Mastodon, the non-profit organization that maintains the software powering the decentralized alternative to social networks like Threads and X, has a new plan to make money. Instead of relying entirely on donations and grants as before, the company announced Friday that it will now offer paid hosting, moderation, and support services for organizati…
…
continue reading

1
Episode 118 - Quantum Cryptography and Quantum Computing with Mark Russinovich
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31In this episode Michael and Mark talk with guest Mark Russinovich, Technical Fellow, Deputy CISO and Chief Technology Officer of Microsoft Azure about quantum cryptography and quantum computing and its implications for security and the future. NOTE: There's a portion where Mark and Michael talk about a quote made by Richard Feynman about understand…
…
continue reading

1
US government charges British teenager accused of at least 120 ‘Scattered Spider’ hacks; plus, OpenAI’s research on AI models deliberately lying is wild
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56The U.S. Department of Justice on Thursday unsealed federal charges against British teenager Thalha Jubair, who prosecutors accuse of being involved in at least 120 cyberattacks, including the U.S. Courts system, and the extortion of dozens of U.S. companies. In other news, Every now and then, researchers at the biggest tech companies drop a bombsh…
…
continue reading

1
SANS Stormcast Friday, September 19th, 2025: Honeypot File Analysis (@sans_edu); SonicWall Breach; DeepSeek Bias; Chrome 0-day
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshield%20Honeypot%20Environment%20%5BGuest%20Diary%5D/32296 Sonicwall Breach SonicWall MySonicWall accounts were breached via crede…
…
continue reading

1
The Rollup TV: Pantera, GSR, Pump Science, AI Supercycle EP 1
2:50:46
2:50:46
Play later
Play later
Lists
Like
Liked
2:50:46The Rollup TV is brought to you by: Boundless: https://beboundless.xyz/ AltLayer: https://www.altlayer.io/ Vertex: https://vertexprotocol.com/ Subsquid: https://www.sqd.ai/ Join The Rollup Family: Website: https://therollup.co/ Spotify: https://open.spotify.com/show/1P6ZeYd.. Podcast: https://therollup.co/category/podcast Follow us on X: https://ww…
…
continue reading

1
Nvidia buys $5 billion stake in Intel, planning AI chip collaboration, also,Bumble BFF’s revamped app is here, focusing on friend groups
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55Nvidia has agreed to buy a $5 billion stake in Intel as part of a broader deal to together develop “multiple generations” of data center and PC products. Also, With friendship apps continuing to gain popularity, Bumble announced on Wednesday the relaunch of its Bumble For Friends app. With younger generations seeking to expand their social circles,…
…
continue reading

1
Cybersecurity Fundamentals: Crypto Shields: How Your Data Stays Secret Chapter 3 Part 1
10:26
10:26
Play later
Play later
Lists
Like
Liked
10:26[email protected] Have you ever wondered what invisible force protects your private messages, banking details, and personal information as they travel across the internet? The answer lies in cryptology—the fascinating science of securing information through mathematical techniques. Cryptology forms the backbone of modern cybersecurity, addres…
…
continue reading

1
How Polygon Plans to Become Crypto's Default Payment Network with Marc Boiron
44:24
44:24
Play later
Play later
Lists
Like
Liked
44:24Payments are becoming crypto's most important use case.In today's episode, we sit down with Marc Boiron, CEO of Polygon Labs, to explore how Polygon is positioning itself as the default payment network with subsecond finality.Marc reveals an unannounced integration with one of the world's largest payment processors and explains why specialized chai…
…
continue reading

1
Advanced Nonlinear Feedback Control Techniques for Automated Vehicles
4:08
4:08
Play later
Play later
Lists
Like
Liked
4:08This story was originally published on HackerNoon at: https://hackernoon.com/advanced-nonlinear-feedback-control-techniques-for-automated-vehicles. This paper explores the application of nonlinear feedback controllers (NLFCs) for automated vehicle control on straight and circular roads. Check more stories related to futurism at: https://hackernoon.…
…
continue reading

1
Amazon launches AI agent to help sellers complete tasks and manage their businesses, also, Lyft and Waymo are partnering to bring robotaxis to Nashville
5:22
5:22
Play later
Play later
Lists
Like
Liked
5:22Amazon announced on Wednesday that it’s introducing an always-on AI agent that will help sellers on its platform run their businesses. The company is updating Seller Assistant, its AI tool for third-party sellers, to help handle tasks on the seller’s behalf. Waymo has struck a deal with ride-hailing company Lyft to launch a robotaxi service in Nash…
…
continue reading
Traditional package management systems for JavaScript have faced several inefficiencies related to dependency storage, resolution, and project performance. pnpm is a fast, disk-efficient package manager for JavaScript and TypeScript projects, serving as an alternative to npm and Yarn. Due to its efficiency and reliability, pnpm is increasingly popu…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading

1
The Rollup TV: DeSci, Ethereum ZK & Stabled Up EP #1
2:26:02
2:26:02
Play later
Play later
Lists
Like
Liked
2:26:02The Rollup TV is brought to you by: Boundless: https://beboundless.xyz/ AltLayer: https://www.altlayer.io/ Vertex: https://vertexprotocol.com/ Subsquid: https://www.sqd.ai/ Join The Rollup Family: Website: https://therollup.co/ Spotify: https://open.spotify.com/show/1P6ZeYd.. Podcast: https://therollup.co/category/podcast Follow us on X: https://ww…
…
continue reading

1
SANS Stormcast Thursday, September 18th, 2025: DLL Hooking; Entra ID Actor Tokens; Watchguard and NVidia Patches
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31CTRL-Z DLL Hooking Attackers may use a simple reload trick to overwrite breakpoints left by analysts to reverse malicious binaries. https://isc.sans.edu/diary/CTRL-Z%20DLL%20Hooking/32294 Global Admin in every Entra ID tenant via Actor tokens As part of September s patch Tuesday, Microsoft patched CVE-2025-55241. The discoverer of the vulnerability…
…
continue reading

1
Sonair built its 3D ultrasonic sensor with robotic safety in mind, and Terra Oleo’s oil-producing microbes could replace destructive palm oil plantations
8:39
8:39
Play later
Play later
Lists
Like
Liked
8:39As robots increasingly enter human spaces, robotics companies will need to think about safety differently than they did when robots were largely siloed from their human counterparts. Sonair thinks its sensors can help robotics companies reach their safety goals — with a solution that is both better and cheaper than popular LIDAR technology. Also, W…
…
continue reading

1
Circle CEO: This Is How We're Betting on Hyperliquid's Future
32:28
32:28
Play later
Play later
Lists
Like
Liked
32:28What happens when crypto's biggest stablecoin issuer faces competition on crypto's hottest trading platform? Today we sit down with Jeremy Allaire, CEO of Circle, right after the USDH proposal drama. Jeremy explains why Circle chose native USDC over creating a new ticker, their plans to become true stakeholders through HYPE purchases and validator …
…
continue reading

1
From Walled Gardens to World Grid: A Short History of How We Centralized the Internet
13:10
13:10
Play later
Play later
Lists
Like
Liked
13:10This story was originally published on HackerNoon at: https://hackernoon.com/from-walled-gardens-to-world-grid-a-short-history-of-how-we-centralized-the-internet. From ARPANET’s open roots to today’s walled gardens, explore how we centralized the internet—and why the fight for a freer web isn’t over. Check more stories related to futurism at: https…
…
continue reading

1
Episode 20: Non-state Special Operations: Capabilities and Effects
1:25:28
1:25:28
Play later
Play later
Lists
Like
Liked
1:25:28Guest Craig Whiteside and co-host Tim Hoyt join Dave Brown to discuss a recent book on Special Operations capabilities being developed by violent non-state actors, including various militants, mercenaries, and even criminal organizations. Join us for this discussion on the growing and emerging capabilities of the dark side of international security…
…
continue reading
In this week's episode, we share ideas, experiences and lessons learned running AI workloads at home. On a laptop, in a custom-built AI rig, and everything in between! (00:00) - Intro and catching up. (03:37) - Show content starts. Show links - HuggingFace - Ollama & Open WebUI - LMStudio - Azure AI Foundry Local Feedback - Give us feedback!…
…
continue reading

1
S02E04 Alex Newman – Trust Crisis: Paths to Renewal
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Centralized systems—Big Pharma, globalist agendas, government education—are crumbling under their own weight, leaving trust in tatters. Alex Newman, investigative journalist and CEO of Liberty Sentinel Media, joins Shawn to rip the veil off these failures. With 2025 exposés on digital IDs, vaccine mandates, and institutional overreach, Newman revea…
…
continue reading

1
PQC vs. QKD: What Matters Now and What Can Wait
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23As regulators publish guidance and timelines tighten, organizations can’t treat quantum readiness as a “future-us” problem. Will Collison details HSBC’s approach: begin the migration now, build crypto agility into architecture, and manage both internal upgrades and external dependencies across vendors, partners, and customers. He clarifies where PQ…
…
continue reading

1
Silicon Valley bets big on ‘environments’ to train AI agents
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03For years, Big Tech CEOs have touted visions of AI agents that can autonomously use software applications to complete tasks for people. But take today’s consumer AI agents out for a spin, whether it’s OpenAI’s ChatGPT Agent or Perplexity’s Comet, and you’ll quickly realize how limited the technology still is. Making AI agents more robust may take a…
…
continue reading

1
SANS Stormcast Wednesday, September 17th, 2025: Phishing Resistants; More npm Attacks; ChatGPT MCP abuse
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has…
…
continue reading

1
SE Radio 686: François Daoust on W3C
1:02:36
1:02:36
Play later
Play later
Lists
Like
Liked
1:02:36François Daoust, W3C staff member and co-chair of the Web Developer Experience Community Group, discusses the origins of the W3C, the browser standardization process, and how it relates to other organizations like TC39, WHATWG, and IETF. This episode covers a lot of ground, including funding through memberships, royalty-free patent access for imple…
…
continue reading

1
The Rollup TV: Circle x HYPE, ETH, StarkWare & Money Moves Fast EP 1
2:57:15
2:57:15
Play later
Play later
Lists
Like
Liked
2:57:15The Rollup TV is brought to you by: Boundless: https://beboundless.xyz/ AltLayer: https://www.altlayer.io/ Vertex: https://vertexprotocol.com/ Subsquid: https://www.sqd.ai/ Join The Rollup Family: Website: https://therollup.co/ Spotify: https://open.spotify.com/show/1P6ZeYd.. Podcast: https://therollup.co/category/podcast Follow us on X: https://ww…
…
continue reading

1
Calm launches standalone iOS app for sleep support, also, Google launches new protocol for agent-driven purchases
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Calm is launching a new standalone app for more personalized sleep support, the company announced on Tuesday. The new Calm Sleep app is available on iOS and is designed to help people wind down, sleep better, and wake up refreshed. On Tuesday, Google announced a new open protocol for purchases initiated by AI agents — automated software programs th…
…
continue reading

1
How ZK-SNARKs Will Transform Ethereum with Justin Drake
24:39
24:39
Play later
Play later
Lists
Like
Liked
24:39ZK-SNARKs are moving from experimental tech to Ethereum's core infrastructure faster than most realize. Today we sit down with Justin Drake from the Ethereum Foundation to explore the "Giga Gas Frontier", his vision for 1 billion gas per second on L1, privacy wormholes bringing anonymity directly to Ethereum, and why collaborative proving networks …
…
continue reading

1
Cyber Resilience Act: What Every Developer Needs to Know
11:35
11:35
Play later
Play later
Lists
Like
Liked
11:35In this episode, hosts Kyle Dando and Bridgette Stone dive into the Cyber Resilience Act (CRA) with guest Sabina Bruce from NXP's Systems Engineering team. They explore what the CRA is, its importance, and its impact on products with digital components. Learn about the main requirements for product security, the different product categories under t…
…
continue reading

1
History of Modern Technology : The 8 inch Floppy
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01[email protected] Step back in time with Professor JRod as we uncover the remarkable story of the 8-inch floppy disk – the groundbreaking invention that forever changed how we store and transport digital information. Before cloud storage, before USB drives, even before the familiar 3.5-inch diskettes of the 1990s, there was the original 8-inc…
…
continue reading

1
Awake’s new app requires heavy sleepers to complete tasks in order to turn off the alarm ... and more tech news
4:53
4:53
Play later
Play later
Lists
Like
Liked
4:53A new iOS app called Awake, designed specifically for heavy sleepers who must complete missions to turn off their alarms, launched Monday. The app is only available to users with the iOS 26 update, which also came out on Monday. he U.S. has reached a “framework” deal with China for social media platform TikTok, CNBC reported, citing Treasury Secret…
…
continue reading

1
SurrealDB 3.0 and Building Event-Driven AI Applications with Tobie Morgan Hitchcock
55:18
55:18
Play later
Play later
Lists
Like
Liked
55:18Modern application development often involves juggling multiple types of databases to handle diverse data models. The lack of unification can lead to complex architectures with attendant security concerns and fragmented development workflows. SurrealDB is an open-source, multi-model database developed in Rust and integrates functionalities of many …
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading