Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Software Podcasts
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Technical interviews about software topics.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The State and Popular Culture
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Audio podcasts on software testing.
…
continue reading
Exploring the observability side of software development.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
next generation web podcast
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Running a bootstrapped software company? Looking to start one? Then this is the podcast for you.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A podcast about web design and development.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
The Python Test Podcast hosted by Brian Okken
…
continue reading

1
Electron and Desktop App Engineering with Shelley Vohr
50:59
50:59
Play later
Play later
Lists
Like
Liked
50:59Electron is a framework for building cross-platform desktop applications using web technologies like JavaScript, HTML, and CSS. It allows developers to package web apps with a native-like experience by bundling them with a Chromium browser and Node.js runtime. Electron is widely used for apps like VS Code, Discord, and Slack because it enables a si…
…
continue reading

1
Uniting software development and application security - Will Vandevanter, Jonathan Schneider - ASW #342
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
…
continue reading

1
Being unambiguous in what you want: the software engineer in a vibe coding world
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43Quinn Slack, CEO and co-founder of Sourcegraph, joins the show to dive into the implications of AI coding tools on the software engineering lifecycle. They explore how AI tools are transforming the work of developers from syntax-focused tasks to higher-level design and management roles, and how AI will integrate into enterprise environments. Episod…
…
continue reading
Alex Kondov knows when you’ve been vibe coding. (He can smell it.) our friends at Charm release a Go-based AI coding agent as a TUI, Jan Kammerath disassembled the “hacked’ Tea service’s Android app, Alex Ellman made a website that provides up-to-date pricing info for major LLM APIs, and Steph Ango suggests remote teams have “ramblings” channels. V…
…
continue reading

1
Ted Neward: Software Architecture - Episode 361
1:06:47
1:06:47
Play later
Play later
Lists
Like
Liked
1:06:47Ted Neward currently labors on behalf of Capital One as a Senior Distinguished Engineer, leveraging his speaking, writing, and coding experience to bring a technology-focused and -sharpened mindset to the mortgage industry. During his more code-focused years, he specialized in high-scale enterprise systems, working with clients ranging in size from…
…
continue reading
Testing Peers Show notes: Software That CaresBy Testing Podcast
…
continue reading
Wesley Beary of Anchor speaks with host Sam Taggart about designing APIs with a particular emphasis on user experience. Wesley discusses what it means to be an “API connoisseur”— paying attention to what makes the APIs we consume enjoyable or frustrating and then taking those lessons and using them when we design our own APIs. Wesley and Sam also e…
…
continue reading

1
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks. Audio reference link: "OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)." by Pravir Chandra, OWASP MSP, 2009.…
…
continue reading

1
MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warning, Claude v GPT-5, Josh Marpet - SWN #500
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warnings, Claude vs GPT-5, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-500
…
continue reading
Cisco reveals a phishing related data breach. SonicWall warns users to disable SSLVPN services after reports of ransomware gangs exploiting a likely zero-day. Researchers uncover a stealthy Linux backdoor and new vulnerabilities in Nvidia’s Triton Inference Server. A new malware campaign targets Microsoft 365 users with fake OneDrive emails. The U.…
…
continue reading
…
continue reading

1
From Testing to DevOps – A Career Move That Makes Sense with Maciek Konkolowicz
30:03
30:03
Play later
Play later
Lists
Like
Liked
30:03Show notes: From Testing to DevOps – A Career Move That Makes Sense with Maciek KonkolowiczBy Testing Podcast
…
continue reading

1
They Can’t Hack All Our Tools If We Keep Buying New Ones
34:18
34:18
Play later
Play later
Lists
Like
Liked
34:18All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Mike Johnson, CISO, Rivian. Joining them is their sponsored guest, Rajan Kapoor, CEO of Material Security. In this episode: AI creates security's catch-22 Delegation without abandonment Google's security gaps demand better…
…
continue reading
All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found more than just opportunity, he found a global dark market. What started as a side hustle turned into an international crime spree. Find Hieu on X: https://x.com/HHieupc. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero…
…
continue reading

1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoptio…
…
continue reading
It started as a going-away party… and became the most legendary hacker conference in the world. This week, Jeff Moss—aka Dark Tangent—tells us how DEF CON began, what it became, and why it still matters. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Microsoft & Google lead zero day exploits, Plague Linux malware maintains SSH access, panel to create US Cyber Force
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20Microsoft and Google among most affected as zero day exploits jump 46% Vietnamese hackers use PXA Stealer, hit 4,000 IPs and steal 200,000 passwords globally New Plague Linux malware stealthily maintains SSH access Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity contr…
…
continue reading

1
Work from home, malware included. [OMITB]
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena…
…
continue reading

1
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
…
continue reading
The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks. AI agents are hijacked, cameras cracked, and devs phished. Gene sequencers and period trackers settle allegations of oversharing personal data and in…
…
continue reading

1
Python Test – 236: Git Tips for Testing – Adam Johnson
20:18
20:18
Play later
Play later
Lists
Like
Liked
20:18Show notes: Python Test – 236: Git Tips for Testing – Adam JohnsonBy Testing Podcast
…
continue reading

1
Defensive Security Podcast Episode 316
1:07:45
1:07:45
Play later
Play later
Lists
Like
Liked
1:07:45Want to support our show? Want to get access to episodes a week before everyone else? Become a patreon sponsor here: https://www.patreon.com/defensivesec If you’re in Atlanta on August 20, you can join us for a LIVE episode at Mission 25. Register here: MCS Mission: Security’25 Our new merch store is live: DefSec Store We’ve added a lot of new item…
…
continue reading

1
Episode 472: Should my junior dev use AI and thrown in to ETL
26:59
26:59
Play later
Play later
Lists
Like
Liked
26:59In this episode, Dave and Jamison answer these questions: I’m the CTO of a small startup. We’re 3 devs including me and one of them is a junior developer. My current policy is to discourage the use of AI tools for the junior dev to make sure they build actual skills and don’t just prompt their way through tasks. However I’m more and more questionin…
…
continue reading
Cory Doctorow has garnered a lot of needed attention to the decline of modern online platforms, including Google Search, Facebook and Twitter. Much of this is a result of coining the now-viral term Enshittification. Today we’ll talk about how the internet was broken and who’s to blame. We’ll also discuss the lack of privacy laws and the threats of …
…
continue reading

1
925: Scott & CJ’s Fave Productivity Apps & Web Apps
51:42
51:42
Play later
Play later
Lists
Like
Liked
51:42Scott and CJ go full productivity nerd, swapping notes on their favorite web apps for writing, coding, planning, and more. From terminals to to-do lists to dumb phones, it’s a deep dive into the tools powering their workflows. Show Notes 00:00 Welcome to Syntax! 00:35 Brought to you by Sentry.io. 01:56 Text to speech or speech to text. 02:20 Superw…
…
continue reading

1
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
…
continue reading

1
676: The $200 Upgrade, CSS Module Scripts, and Social Media Ethos
1:00:07
1:00:07
Play later
Play later
Lists
Like
Liked
1:00:07Show Description It's time for a ShopTalk GearTalk segment on video and audio upgrades, a chat about better YouTube thumbnails, buying the $200 Yamaha guitar (or equivalent in other areas of life), Chris and Dave riff on CSS modules, and what's your social media ethos in 2025? Listen on Website → Links how to make a killer thumbnail (for the 2025 a…
…
continue reading

1
Akira’s SonicWall zero-day, UK Legal-Aid suffers, Luxembourg 5G attack
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start y…
…
continue reading

1
Cybersecurity Today: Hamilton's Ransomware Crisis and Emerging AI and OAuth Threats
9:46
9:46
Play later
Play later
Lists
Like
Liked
9:46In this episode of 'Cybersecurity Today,' host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights a severe vulnerability, CVE-2025-54135, in the AI-powe…
…
continue reading

1
F75: Некомпетентные и трусливые менеджеры | Max | AI архитектура | Саботаж | Zerocracy | Алкоголь
1:19:18
1:19:18
Play later
Play later
Lists
Like
Liked
1:19:18Video is here: https://youtube.com/live/TBpNG70xWswBy Yegor Bugayenko
…
continue reading

1
SANS Stormcast Monday, August 4th, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day;
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
…
continue reading
Tea Spilled in Crazy Breach; Trying to Shake Me Down for $30k; The IoT Light Switch Saga Continues; Pi-hole Pwned; Sponsored by: Report URI https://www.troyhunt.com/weekly-update-463/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
Hannah Kenney: Focused on people. [Risk] [Career Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Career Notes. Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down …
…
continue reading
Joey DeVilla of Tampa Tech fame and accordion playing glory joins Mike to discuss the Tampa Tech scene, some Python goodness, a little Rust and much more. Try Mailtrap for free Joey's Blog Mike on X Mike on BlueSky Coder on X Coder on BlueSky Show Discord AliceBy The Mad Botter
…
continue reading

1
nOAuth-ing to see here. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. This low-complexi…
…
continue reading

1
Combating the Grandparent Scam: A Deep Dive into Cybersecurity and Law Enforcement Efforts
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53This episode explores the 'Grandparent Scam,' a prevalent and profitable fraud targeting seniors by exploiting their concern for their grandchildren. Experts Deirdre and John from Ireland's National Cybersecurity Center and the Ontario Provincial Police share insights into the scam's mechanics, the emotional impact on victims, and the challenges la…
…
continue reading

1
The Escobar Phone and Imaginary Flamethrowers
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23We unpack how a Swedish entrepreneur used Pablo Escobar’s name to sell fake phones, flamethrowers, and crypto — and how a viral scam built on influencer hype finally came crashing down. That and other stories. Hacked is brought to you by Push Security, check them out at PushSecurity.com Learn more about your ad choices. Visit podcastchoices.com/adc…
…
continue reading

1
Week in Review: Surveillance camera vulnerabilities, data sovereignty conundrum, French submarine cyberattack
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University – also check out Derek’s substack. Thanks to our show sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That’s why c…
…
continue reading

1
Pipes, Thorium, Excel, ATM Hillbilly Cannibal Attack, Lambdas, AIs, Aaran Leyland - SWN #499
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
…
continue reading
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Ras…
…
continue reading
Adam & Jerod (plus zero other randos) dig into Stack Overflow’s 2025 developer survey results. We discuss SO’s decline, the desire for younger devs to have real chats with real people, the rise of uv and more Python winning, why people are frustrated with AI, and more. Join the discussion Changelog++ members save 4 minutes on this episode because t…
…
continue reading

1
No Scripts, No Frameworks, No Maintenance? with Don Jackson
34:27
34:27
Play later
Play later
Lists
Like
Liked
34:27Show notes: No Scripts, No Frameworks, No Maintenance? with Don JacksonBy Testing Podcast
…
continue reading
In this episode, Conor and Bryce continue part 2 of their chat about AI, how it's changing the way they work and more. Link to Episode 245 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Bryce Adelstein Lelbach: Twitter Show Notes Date Re…
…
continue reading

1
#184 Senior Playstation Engineer's tips for learning new tools and getting things done
1:24:13
1:24:13
Play later
Play later
Lists
Like
Liked
1:24:13On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Dilip Krishnamoorthi. He's a software engineer working at Sony, building user interfaces for Playstation game consoles where he's been for 10 years. We talk about: - How he dropped out of a traditional Indian university and used an inexpensive distance learning pro…
…
continue reading

1
ATM Raspberry Pi breach, Easterly West Point cancellation, Chinese company-hacker link
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53NATM network breached and attacked through 4G Raspberry Pi Easterly’s appointment to West Point rescinded Report links Chinese companies to tools used by state-sponsored hackers Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in auto…
…
continue reading
Australia wants to keep kids off social media. But to do that, it may have to crack open everyone’s digital ID. Privacy advocates say this isn’t just about protecting children– it is about rewriting the social contract for the rest of us. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading