Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Solutions Podcasts

show episodes
 
Artwork

1
Enterprise Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
Artwork

1
Enterprise Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Security DNA

Endeavor Business Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
  continue reading
 
Artwork

1
Browsing Security

LayerX Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork

4
Retirement Solutions - The Podcast

Tyson Thacker and Ryan Thacker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Retirement Solutions – The Podcast, with Tyson Thacker and Ryan Thacker, where precision meets purpose. This B.O.S.S. podcast is committed to “Building the Optimal System of Security.” Learn how you could craft the ideal retirement blueprint that surpasses mere wealth accumulation. Explore the nuances of retirement planning with expert insights, as Tyson and Ryan navigate the ever-evolving landscape of investments, insurance solutions, and financial planning for retirees and pre-r ...
  continue reading
 
Artwork
 
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
  continue reading
 
Artwork

1
AWS Podcast

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
  continue reading
 
Artwork

1
Let's Talk Azure!

Alan Armstrong & Sam Foot

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Listen with Alan Armstrong and Sam Foot as we talk about all things Microsoft Azure! We are both technical consultants working with Azure day in, day out. Alan focuses on Identity and Security automation while Sam is a .NET developer deploying PaaS and SaaS solutions on Azure. Each episode we have a topic we cover and we highlight some key news that we are interested in. No fluff, sales or products here, just two technical people having a light hearted chat.
  continue reading
 
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
  continue reading
 
Artwork

51
The AI Security Edge

theaisecurityedge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
  continue reading
 
Artwork

1
Chatham House

Chatham House

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Chatham House is an independent policy instute, based in London. We have been a source of independent analysis, trusted dialogue and influential ideas for one hundred years. Today, at the beginning of our second century, we continue to offer solutions to global challenges and actively seek to empower the next generation to change their world.
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cybhttps://dashboard.transistor.fm/shows/simply-ics-cyber/episodeser podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. ...
  continue reading
 
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
  continue reading
 
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
  continue reading
 
Artwork
 
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
Philosophize This!

Stephen West

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
  continue reading
 
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
  continue reading
 
The IQT Podcast explores and offers insight about rapidly evolving technology trends and their impact and contributions to national security. Subscribe to hear from IQT and other thought leaders across a variety of tech domains, including AI and machine learning, biotechnology, autonomous systems, and more. IQT identifies, adapts, and delivers technology solutions from commercial startups to support the national security missions of the U.S. and its allies. Learn more at www.iqt.org.
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
Artwork

1
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Gregg MacInnis, Owner and President of Gmac Family Financial, joins you on Countdown to Retirement to offer up innovative financial strategies, solutions, security, and overall financial health. Listen as Gregg talks about his passion to serve his community and break down financial planning for your retirement.
  continue reading
 
Artwork

1
CloudNext

GlobalDots

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CloudNext is your go-to source for cloud innovation and leaders' insight. Your way to stay up-to-date with the latest trends and innovations critical to Cloud, Security, and DevOps success. Pick the brains of C-level executives of renowned companies in tech, sharing their stories of innovation and personal growth. Explore their transformative insights as they fuse personal narratives with strategic advice, revealing how to achieve technological solutions for the challenges & pain points in t ...
  continue reading
 
As organizations accelerate their adoption of generative AI and intelligent agents to transform how they build and manage solutions, IT professionals and developers are expanding their expertise to design, deploy, and govern AI-powered systems—leveraging Microsoft Copilot Studio and Azure AI Foundry to integrate collaboration tools, enforce enterprise-grade compliance, and support both low-code and pro-code development. With built-in security frameworks, governance controls, and seamless int ...
  continue reading
 
Artwork
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
  continue reading
 
Loading …
show series
 
It seems like each and every board on the planet is demanding that their executive teams "AI all the things," at least when it comes to high tech. In episode 6 of The AI Security Edge, Caroline Wong and Rock Lambros discuss the governance frameworks that Rock developed to combat the chaos of an approach with no real strategy. RISE: Research, Implem…
  continue reading
 
In this episode of the AWS Podcast, we explore the evolving world of contact centers and Amazon Connect. The discussion covers why contact centers remain critical to both business and public sector operations, and how they're transforming from traditional cost centers into valuable sources of business intelligence. Key highlights include Amazon Con…
  continue reading
 
In this episode, Matt Hillary, CISO at Drata, explains how their AI-native trust management platform addresses these challenges by automating evidence collection from integrated systems and reducing manual effort by over 90%. Joining him are Mike Lockhart, CISO at EagleView, and Johna Till Johnson, CEO at Nemertes. We talk about how Drata’s platfor…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
Maximizing AWS Lambda Performance: A Complete Optimization Guide https://knowledge.businesscompassllc.com/maximizing-aws-lambda-performance-a-complete-optimization-guide/ Struggling with slow AWS Lambda functions? This podcast helps developers and cloud architects turn sluggish serverless applications into high-performing solutions. We’ll walk thro…
  continue reading
 
Creating EKS-Optimized Amazon Linux 2023 AMIs for Kubernetes Workloads https://knowledge.businesscompassllc.com/creating-eks-optimized-amazon-linux-2023-amis-for-kubernetes-workloads/ Looking to optimize your Kubernetes environment on AWS? This podcast helps DevOps engineers and cloud architects build custom EKS-optimized Amazon Linux 2023 AMIs for…
  continue reading
 
AWS Database Services for Every Workload: A Complete Overview https://knowledge.businesscompassllc.com/aws-database-services-for-every-workload-a-complete-overview/ Looking for the right AWS database service for your project? This podcast helps developers, database administrators, and IT decision-makers navigate AWS’s extensive database offerings. …
  continue reading
 
AWS Model Deployment Best Practices for Scalable AI Solutions https://knowledge.businesscompassllc.com/aws-model-deployment-best-practices-for-scalable-ai-solutions/ Deploying machine learning models on AWS requires careful planning to ensure performance at scale. This podcast helps data scientists, ML engineers, and DevOps teams implement AWS best…
  continue reading
 
Data Analysis and Story Telling Made Easy: S3, AWS Glue, Athena, Quicksight and QuickSight Q https://knowledge.businesscompassllc.com/data-analysis-and-story-telling-made-easy-s3-aws-glue-athena-quicksight-and-quicksight-q/ Looking to unlock insights from your data without complex infrastructure? AWS offers a complete toolkit for data analysts, bus…
  continue reading
 
AWS EC2 Disaster Recovery: Restoring from an AMI Backup https://knowledge.businesscompassllc.com/aws-ec2-disaster-recovery-restoring-from-an-ami-backup/ When your AWS EC2 instances crash, knowing how to restore from AMI backups can save your business from extended downtime. This podcast helps IT administrators and DevOps engineers quickly recover E…
  continue reading
 
DynamoDB Pagination Explained: How to Build Scalable Data Retrieval in AWS https://knowledge.businesscompassllc.com/dynamodb-pagination-explained-how-to-build-scalable-data-retrieval-in-aws/ Need to retrieve large datasets from DynamoDB without crashing your application or breaking the bank? This podcast is for AWS developers and solution architect…
  continue reading
 
GreptimeDB Serverless: A Game-Changer for IoT, Monitoring, and Analytics https://knowledge.businesscompassllc.com/greptimedb-serverless-a-game-changer-for-iot-monitoring-and-analytics/ GreptimeDB Serverless helps developers, data engineers, and IT professionals manage time-series data without infrastructure headaches. This new database solution spe…
  continue reading
 
AWS Architecture Essentials: What Every Cloud Developer Needs to Know https://knowledge.businesscompassllc.com/aws-architecture-essentials-what-every-cloud-developer-needs-to-know/ New to AWS or looking to level up your cloud skills? This podcast breaks down the essential AWS architecture concepts that cloud developers need to master. We’ll explore…
  continue reading
 
AWS Batch Made Simple: Run, Scale, and Optimize Your Batch Jobs in the Cloud https://knowledge.businesscompassllc.com/aws-batch-made-simple-run-scale-and-optimize-your-batch-jobs-in-the-cloud/ Need to run complex workloads without managing infrastructure? AWS Batch helps developers, data scientists, and IT teams automate and scale compute-intensive…
  continue reading
 
Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes. Craig believes cybersecurity awareness should be short, engaging, …
  continue reading
 
Präsentation der Projekte anlässich des «Jugend hackt» Events vom 15 bis 17 August 2025 im Hackerspace «Bitwäscherei» in Zürich.Beim Projet Pet2Print ging es darum, ein eigenes Filament aus PETFlaschen, die in den Ozeanen als Abfall herumschwimmen, zuproduzieren. Dafür haben Florin, Karl, Emil und Lev ein eigenes Gerätgebastelt, mit Kugellagern und…
  continue reading
 
When it comes down to scaling time series monitoring solutions things can get messy. That’s one of the reasons why VictoriaMetrics, a Silver member of the Cloud Native Computing Foundation (CNCF), started its journey some years ago. It is a simple, reliable and efficient set of Observability Solutions that's been adopted by many organizations. It's…
  continue reading
 
Was passiert wenn kritische Open Source Projekte nicht mehr gepflegt werden?Im November 2024 hat Perforce Inc mitgeteilt, ab sofort keine Open Source Pakete für Puppet mehr bereitzustellen.Von einem Tag auf den anderen wurden Git Repositories nicht mehr geupdated, Pull Requests wurden ignoriert.Vox Pupuli ist eine etablierte Community.In dem Vortra…
  continue reading
 
sq is Sequoia PGP’s primary command line tool. In this talk, I'll briefly present sq's design philosophy and architecture, and then I'll demonstrate several different workflows.sq is Sequoia PGP’s primary command line tool.In this talk, I’ll present sq. I’ll start by discussing sq’s design philosophy. In particular, I’ll explain how sq aims to firs…
  continue reading
 
Welche Art von Code wird im Forschungsprozess produziert und wie können wir ihn für spätere Nutzung aufbereiten? Wir sprechen darüber, wie wir Forschungsskripte langzeitarchivieren wollen, was Nachnutzbarkeit für Forschungscode aus der Psychologie bedeutet und geben einen Einblick in die Praxis.Mit der Open Science Bewegung halten auch neue Arten v…
  continue reading
 
On the search for open and decentralized alternatives to commercial social media platforms many have given Mastodon and/or the Fediverse a try. But if you never made the jump or did not stay around for whatever reason you might be interested in what exciting new developments are happening in and around the Fediverse.In the past years changes in est…
  continue reading
 
In dem Vortrag soll ein Überblick über Nix und NixOS mit Fokus auf Deployments von NixOS-Containern auf einem Server gegeben werden.Nix und NixOS sind extrem mächtige - und komplexe - Systeme. Gerade Container-Verwaltung und Deployment mit Nix kann sehr viele Vorteile haben. Dieser Vortrag hat das Ziel anschaulich einige Startpunkte für alle zu geb…
  continue reading
 
Vor noch vor 12 Monaten war es schwer, Softwareentwickler auf dem Markt zu gewinnen. Ein jahrzehntelanger Trend steigender Gehälter in einem wachsenden Markt wiegte alle in Sicherheit, dass dies so bleiben würde … Heute sind Softwareentwickler:innen leichter verfügbar als Handwerker:innen, die Preise sinken, Dienstleister kämpfen um ihre Existenz. …
  continue reading
 
Deutschland ist weltweit für seinen Maschinenbau bekannt. In letzter Zeit befindet sich dieser allerdings in einer schweren Krise. Um den Deutschen Maschinenbau wieder auf Vordermann zu bringen und erneit zur Weltspitze zu machen, wurde ein Open-Source-Toolkit zusammengestellt und validiert, mit welchem Maschinenbauer ihr Startup gründen können. Zu…
  continue reading
 
In 2003, we created a security research project, that led to a development of several routers, designed and manufactured in EU. I'll talk a little bit about what we do and how, but I would like to speak more about our original goal - the security research project and what we noticed.Licensed to the public under http://creativecommons.org/licenses/b…
  continue reading
 
Telefon, Video-Konferenz und Chat: unterschiedliche Medien brauch(t)en verschiedene Clients.Als simples, gut wartbares und desktopintegriertes Softphone gestartet, möchte das OSS-Projekt GOnnect die Bereiche SIP-Telefonie, Videokonferenzen und Chat seamless in einem Client vereinen. In diesem Vortrag kläre ich die Gründe, warum ein neues Softphone …
  continue reading
 
Digitales Mapping wurde lange Zeit von kommerziellen Anbietern dominiert, die durch Kosten, Komplexität und Bedenken hinsichtlich des Datenschutzes Barrieren geschaffen haben. In diesem Vortrag wird Protomaps vorgestellt, ein Open-Source-Projekt, das die Art und Weise, wie Webkarten bereitgestellt und genutzt werden, neu definiert.Durch die Verwend…
  continue reading
 
In diesem Vortrag möchte ich insbesondere auch darauf eingehen, wie man seine Stärken herausfinden kann und welche Methoden helfen, den richtigen Job (auch als Führungskraft mit "nur" technischem Hintergrund) zu finden.In diesem Vortrag möchte ich meinen unerwarteten Weg eines technischen Experten zur Führungskraft beschreiben. Trotz anfänglicher Z…
  continue reading
 
AI Cockpit is a federal German research project, that explores possibilities to keep humans in control of complex AI systems. One of the results is an open source software system, that implements APIs and a user interface to enforce human oversight according to §14 AI Act.In this talk development team wants to introduce AI Cockpit software. Talk is…
  continue reading
 
In this session, Aliaksandr presents his innovative approach to log management after studying the limitations of existing logging systems.Logging at scale is a common source of infrastructure expenses and frustration. While logging is something any organization does, there is still no silver bullet or just a simple and scalable solution without tra…
  continue reading
 
VersaTiles is a powerful, free and open web map stack that runs on every major platform. Now, you can run your own map server in seconds!VersaTiles combines the best features of existing open-source projects into one modular system. We also offer free vector tiles based on OpenStreetMap and raster tiles featuring satellite and aerial imagery. Versa…
  continue reading
 
Copyleft-Lizenzen, wie die GPL, schreiben vor, dass Verbraucher neben der Binary auch den vollständigen Quelltext erhalten. Wie kürzliche Gerichtsverfahren gezeigt haben, können auch Verbraucher auf die Bereitstellung dieses Quelltextes klagen. Daneben können auch Verbraucherverbände klagen; diese können gleich für alle Geräte eines Herstellers kla…
  continue reading
 
Mit DevGuard stellen wir ein Open-Source-Projekt vor, das Sicherheit für Entwickler:innen zugänglich, pragmatisch und automatisierbar macht. Angesichts zunehmender Angriffe auf Software-Supply-Chains und wachsender regulatorischer Anforderungen (z. B. CRA) adressiert DevGuard zentrale Herausforderungen der sicheren Softwareentwicklung: komplexe Too…
  continue reading
 
Authenticating users can start simple with a username and a password for each user. But you will also need to handle forgotten passwords and user registration. You might also want to validate email addresses, add second factors and have users update their profile information as needed.A single-sign-on system like Keycloak can handle all that for yo…
  continue reading
 
Entwickler*innen können von KI-Tools profitieren – aber wie klappt das jenseits von Big Tech? Der Vortrag gibt eine Übersicht zu den spannendsten freien KI-Lösungen und deren Einsatz in der Softwareentwicklung.KI hat die Entwicklungspraxis bereits verändert. KI kann Code generieren und wird auch produktiv in der Entwicklung eingesetzt. Doch meist s…
  continue reading
 
„Confidential Computing“ bezeichnet eine Reihe von hardwaregestützten Technologien, die angeblich vertrauliche Datenverarbeitung in der Cloud ermöglichen. In diesem Vortrag zeige ich, wie diese Mechanismen funktionieren, welchen Versprechen man trauen kann – und wo ihre Grenzen liegen.Confidential Computing verspricht Privatsphäre durch Hardware – …
  continue reading
 
Das ToyCollect Projekt ist ein Open-Source Software und (hauptsächlich) Open-Source Hardware Projekt mit einem Fokus auf kleine indoor Roboter mit 3D-gedrucktem modularen Gehäuse.Wir sind momentan dabei, die nächste Generation mit Stereo-Kamera, Bumper-Sensoren, Tiefenkamera, Lagesensoren und "Unter-der-Couch-Detektoren" fertigzustellen - siehe Log…
  continue reading
 
Open source is more than code: it's a movement that empowers communities to build resilient, sovereign digital infrastructure. In an era of geopolitical realignment, centralised, corporate-controlled platforms threaten our social, political, and economic freedoms. This keynote examines how open source principles and the Fediverse (using Mastodon as…
  continue reading
 
Der Chip des Trusted Plattform Modules hat einige schöne Fähigkeiten, zum Beispiel kann er Schlüssel sicher verwalten.Dies kann man sich beim Thema Festplattenverschlüsselung zunutze machen.- Doch wie funktioniert das genau? Was sind die mysteriösen PCRs?- Worauf muss bei der Umsetzung geachet werden?- Wie unterscheiden sich hier die Distributionen…
  continue reading
 
"Fachkräftemangel!" "Wir finden keine guten Leute!" "Wir würden ja total gerne mehr Frauen einstellen, es bewerben sich nur keine!" — wenn in deinem Unternehmen solche Sätze rumfliegen, dann macht es gewaltig was falsch.Seit mindestens 30 Jahren macht die Open Source Community — und Unternehmen, die sich an ihr orientieren — vor, wie man sich aufst…
  continue reading
 
Free Libre Open Source Software (FLOSS) hat sich mittlerweile einen Stammplatz im deutschen Hochschulwesen erobert und ist ist als fester Ausbildungsbestandteil aus den Modulplänen nicht mehr wegzudenken. So sollte man/frau/div jedenfalls meinen.Leider sieht die Realität anders aus. Viel zu oft werden die Schwerpunkte immer noch auf proprietäre Sof…
  continue reading
 
The Small Device C Compiler (SDCC) is a free C compiler targeting 8-bit architectures, including MCS-51, STM8, Padauk, Rabbit, S08. It supports standard C up to current ISO C23. We discuss the current state of SDCC, its use in writing firmware, and plans for the near future.Many devices include small 8-bit processors using architectures not or not …
  continue reading
 
Die europäische "Vat In the Digital Age" (ViDA) Richtlinie, Anlass für das Wachstumschancengesetz (WCG), sieht vor, dass alle B2B-Rechnungen, grenzüberschreitend oder innerdeutsch (WCG), in "Echtzeit" (10 Tage) in ein zentrales staatliches Umsatzsteuer-Meldesystem hochgeladen werden. Dieser Vortrag beschreibt die erfolgte und drei kommenden Phasen …
  continue reading
 
Der Matter-Standard, eine Initiative zur Vereinheitlichung der Smart-Home-Kommunikation, erweitert seine Funktionen um ein integriertes Energie-Management. Dieser Vortrag beleuchtet, wie Matter die Energieeffizienz in vernetzten Haushalten durch Standardisierung und Interoperabilität verbessert.Vortrag: Energie-Management im Matter-StandardDer Matt…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play