Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Software Development Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Technical interviews about software topics.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A podcast about web design and development.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
The State and Popular Culture
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
next generation web podcast
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Audio podcasts on software testing.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Justin Searls describes the “full-breadth developer” and why they’ll win because AI, Cloudflare comes up with a way publishers can charge crawlers for access, Hugo Bowne-Anderson explains why building AI agents fails so often, the Job Worth Calculator tells you if your job is worth the grind, and Sam Lambert announces PlanetScale for Postgres. View…
…
continue reading

1
SE Radio 675: Brian Demers on Observability into the Toolchain
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41Brian Demers, Developer Advocate at Gradle, speaks with host Giovanni Asproni about the importance of having observability in the toolchain. Such information about build times, compiler warnings, test executions, and any other system used to build the production code can help to reduce defects, increase productivity, and improve the developer exper…
…
continue reading

1
Extreme Native Perf on the Web with Superhuman
48:54
48:54
Play later
Play later
Lists
Like
Liked
48:54Wes and Scott talk with Loïc Houssier about how Superhuman builds lightning-fast, delightfully-designed email software. They dig into engineering philosophy, offline-first architecture, local databases, AI-powered productivity, and what it takes to create tools that people love. Show Notes 00:00 Welcome to Syntax! 03:05 Inside Superhuman and Loïc’s…
…
continue reading

1
DOP 306: Understanding GraphQL's Role in Modern APIs
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12#306: In this episode of DevOps Paradox, we delve into the role of GraphQL in modern APIs with guest Sophia Willows from Rye. They discuss the pros and cons of using GraphQL versus REST and gRPC, highlighting the efficiencies and complexities each brings to API development, especially in developer tools. They tackle common misconceptions and usage …
…
continue reading

1
Perfection Is Fragile, and You Should Avoid It
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03This episode discusses why perfection is a dangerous and fragile goal, explaining how striving for 100% leads to unsustainable outlier states. It highlights how setting perfection as a bar can cause commitments to break and plans to fail due to a lack of slack, and offers strategies like building redundancy and planning with slack to achieve goals …
…
continue reading

1
Rubio Spoofed, RondoDox Botnet, Batavia Spyware
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43Four members of President Trump's cabinet impersonated Is this some kind of a game? Batavia attacks Russian industrial companies Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely o…
…
continue reading

1
AI Threats, Enterprise Security, and Google's Confusing Gemini Release: Cybersecurity Today
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57In this episode of 'Cybersecurity Today,' host Jim Love discusses the recent deep fake attack on high-ranking US government officials using AI voice cloning technology. The conversation highlights the growing ease and risks of AI-generated impersonations. The episode also covers the advancements in AI systems connecting with enterprise data and the…
…
continue reading

1
SN 1033: Going on the Offensive - The Digital Arms Race
3:04:57
3:04:57
Play later
Play later
Lists
Like
Liked
3:04:57Another Israeli spyware vendor surfaces. Win11 to delete restore points more quickly. The EU accelerates its plans to abandon Microsoft Azure. The EU sets timelines for Post-Quantum crypto adoption. Russia to create a massive IMEI database. Canada and the UK create the "Common Good Cyber Fund". U.S. states crack down on Bitcoin ATMs amid growing sc…
…
continue reading

1
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack;
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
…
continue reading
Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offlin…
…
continue reading

1
Software Testing Job Market with Jack Cole
59:35
59:35
Play later
Play later
Lists
Like
Liked
59:35Show notes: Software Testing Job Market with Jack ColeBy Testing Podcast
…
continue reading
What’s the difference between a good Release Train Engineer (RTE) and an exemplar RTE? Glenn Smith, SPCT and director of Nimbility, explains in this episode. Like what you hear? Connect with Glenn on LinkedIn. Explore SAFe courses here.
…
continue reading

1
903: LLM Benchmarks Are Lying to You (And What to Do Instead), with Sinan Ozdemir
1:28:20
1:28:20
Play later
Play later
Lists
Like
Liked
1:28:20Has AI benchmarking reached its limit, and what do we have to fill this gap? Sinan Ozdemir speaks to Jon Krohn about the lack of transparency in training data and the necessity of human-led quality assurance to detect AI hallucinations, when and why to be skeptical of AI benchmarks, and the future of benchmarking agentic and multimodal models. Addi…
…
continue reading

1
Not Enough Hallucinations? Let’s Outfit Your LLM with Another LLM
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Anthony Candeias, CISO, Weight Watchers. In this episode: AI agents require structured supervision, not autonomy Hiring for potential over credentials in cyb…
…
continue reading

1
SED News: Data Land Grabs, Copyright Fights, and the Great AI Talent War
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15Welcome back to SED News, a podcast series from Software Engineering Daily where hosts Gregor Vand and Sean Falconer break down the latest stories in software engineering, Silicon Valley, and the wider tech industry. In this episode, Gregor and Sean dig into Meta’s legal battle over AI training data, discuss the strategic implications of Meta’s $14…
…
continue reading
I'm in Tokyo; Catwatchful Spyware Breach; Truyu is HIBP's Newest Partner; The Qantas Breach; Ticket Hell; Sponsored by Report URI https://www.troyhunt.com/weekly-update-459/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
Call of Duty game pulled, U.S. military gets cybersecurity boost, Bank employee helped hackers
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33Call of Duty game pulled from PC store after reported exploit U.S. military gets cybersecurity boost Bank employee helped hackers steal $100M Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC progr…
…
continue reading

1
adversary group naming (noun) [Word Notes]
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.By N2K Networks
…
continue reading

1
Return to Ukraine’s Radio ROKS: Heavy metal (and hackers) for brothers in arms
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04Before the war, Serhii Zenin played Metallica and joked with listeners on Ukraine’s Radio ROKS. Now he wears fatigues. And the station? It's still playing heavy metal—but now it’s also broadcasting news, coordinating aid, and holding the line in its own way. We return to a story where the frontlines and the airwaves meet. Learn about your ad choice…
…
continue reading

1
Attention isn’t all we need; we need ownership too
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32NEAR is the blockchain for AI, enabling AI agents to transact freely across networks. Connect with Illia on LinkedIn and X, and read the original Transformers paper that Illia co-authored in 2017. Today’s shoutout goes to Populous badge winner Adi Lester for answering the question DataTable - foreach Row, EXCEPT FIRST ONE.…
…
continue reading

1
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
…
continue reading
Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following…
…
continue reading

1
Automating the DevOps Pipeline with Maurice McCabe
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59Show notes: Automating the DevOps Pipeline with Maurice McCabeBy Testing Podcast
…
continue reading

1
Episode 468: Should I take a mini-retirement and doubling down on anachronisms
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12In this episode, Dave and Jamison answer these questions: Hi Dave and Jamison, Long-time listener, first-time question asker. Thank you both for the wisdom, perspective, and jokes you bring to the podcast. I recently received an inheritance of around $500,000. It’s not “quit your job and buy a yacht” money, but it is enough to reshape my life. I’m …
…
continue reading
Privacy risks are bad enough for adults – but it’s much worse for our kids, particularly as students. Who provides notice and obtains consent for minors at school? In many cases it’s not the parents, let alone the students – it’s the school system. Not only are they opting the students into invasive data collection by profit-driven third parties, b…
…
continue reading
Scott and Wes round up the hottest AI tools you should have on your radar; from text-to-speech wizards to self-hosted image generators. They break down what they’re using, what’s worth paying for, and which tools are changing their workflows. Show Notes 00:00 Welcome to Syntax! 00:49 Getting too cozy with your tools. 01:34 Brought to you by Sentry.…
…
continue reading

1
672: Design Tokens, Web Compents, and Web Monetization
51:30
51:30
Play later
Play later
Lists
Like
Liked
51:30Show Description We're all addicted to Clues by Sam and wonder about the data structure for the site, good thoughts on the design tokens community, shadow DOM, the state of web components in mid-2025, dealing with JSON, and new ideas around web monetization. Listen on Website → Links Clues By Sam web-platform-tests dashboard P&B: Dave Rupert – Manu…
…
continue reading

1
Uncle Bob Martin: Software Leader - Episode 357
43:01
43:01
Play later
Play later
Lists
Like
Liked
43:01Robert C. Martin, more often known as Uncle Bob, has been programming since 1970 and has served as a mentor to generations of software engineers. He’s one of the original authors of the Agile Manifesto and played a foundational role in forming the Agile Alliance, where he served as its first chairman. But beyond titles and organizations, Bob’s last…
…
continue reading

1
Ingram Micro cyberattack, Telefonica possible breach, LLM URL recommendation problem
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Ingram Micro suffers ransomware attack Hacker leaks Telefónica data allegedly from new breach ChatGPT prone to recommending wrong URLs, creating a new phishing opportunity Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but …
…
continue reading

1
Ingram Micro Ransomware Attack and the Rise of Linux SSH Server Compromises
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41In this episode of Cybersecurity Today, host David Shipley discusses the recent Safe Play ransomware attack on technology distributor Ingram Micro, exploring its impact and ongoing recovery efforts. The script also examines a new campaign targeting misconfigured Linux servers to build proxy networks for cybercriminal activities. Additionally, the e…
…
continue reading

1
SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
…
continue reading

1
Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Please enjoy this encore of Career Notes. Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer…
…
continue reading

1
F71: Эстетика первична | Обратная связь | Исследователи | Солопренеры | Видео игры | Любовь и брак
1:22:20
1:22:20
Play later
Play later
Lists
Like
Liked
1:22:20Video is here: https://youtube.com/live/u-HztG2z-kUBy Yegor Bugayenko
…
continue reading

1
Botnet’s back, tell a friend. [Research Saturday]
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47Please enjoy this encore of Research Saturday. This week we are joined by Silas Cutler, Principal Security Researcher at Censys, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems…
…
continue reading
Just for fun: an actual no script, no plan, hot mic blather-athon. If you crave a nice structured story with lots of research, give the ep we dropped a few days ago about the Texas Lottery Courier App scandal a listen. This is to wash some dishes to. Links to some stuff we discuss below: CBC On Design First Episode: https://www.youtube.com/watch?v=…
…
continue reading

1
AI and Cybersecurity: A Deep Dive into Enterprise Applications and Digital Sovereignty with Krish Banerjee
50:50
50:50
Play later
Play later
Lists
Like
Liked
50:50In this episode of Cybersecurity Today, host Jim Love engages in a comprehensive conversation with Krish Banerjee, the Canada Managing Director at Accenture for AI and Data. They delve into the stark difference between perceived and actual preparedness for cybersecurity in the face of growing AI adoption. The discussion spans topics such as the rol…
…
continue reading

1
Selling mountain bikes all over the planet (Friends)
2:08:08
2:08:08
Play later
Play later
Lists
Like
Liked
2:08:08Jeff Cayley joins Adam to talk about selling mountain bikes all over the planet and making some of the best outdoor and mountain bike gear, parts, and accessories you can buy. They have a killer YouTube channel as well. Join the discussion Changelog++ members save 62 minutes on this episode because they made the ads disappear. Join today! Sponsors:…
…
continue reading

1
Episode 241: Parallel Algorithm Talk (Part 3)
38:45
38:45
Play later
Play later
Lists
Like
Liked
38:45In this episode, Conor and Bryce chat with Jared Hoberock about the NVIDIA Thrust Parallel Algorithms Library, specifically scan and rotate. Link to Episode 241 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Bryce Adelstein Lelbach: Twit…
…
continue reading

1
#178 From freeCodeCamp to NASA with Data Engineer Joe Hill
1:32:13
1:32:13
Play later
Play later
Lists
Like
Liked
1:32:13On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Joe Hill. He's a software engineer who works on a data platform for NASA. Joe taught himself programming for 4 years while working as a janitor. As the single father of two Autistic boys, he first used his programming skills to build an iPad app to help them learn …
…
continue reading
In this episode of “In Case You Missed It”, Jon recaps his June interviews on The SuperDataScience Podcast. Hear from Diane Hare, Avery Smith, Kirill Eremenko, and Shaun Johnson as they talk about the best portfolios for AI practitioners, how to stand out in a saturated candidate market for AI roles, how to tell when an AI startup is going places, …
…
continue reading

1
Undetectable Android spyware is detectable, Hunters ransomware quits, Salt Typhoon dormant
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09Undetectable Android spyware leaks user logins Hunters ransomware group shuts doors Medical device company Surmodics reports cyberattack Huge thanks to our sponsor, Palo Alto Networks You’re moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. …
…
continue reading

1
Turning data into decisions. [Deep Space]
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Please enjoy this encore from our T-Minus Space Daily segment Deep Space. Parker Wishik from The Aerospace Corporation explores how experts are turning data into decisions in the space industry on the latest Nexus segment. Parker is joined by Jackie Barbieri, Founder and CEO of Whitespace, and Dr. Steve Lewis, Leader of The Aerospace Corpora…
…
continue reading

1
Mic Drop: Guardians of the Galaxy are sitting in Colorado Springs
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38While most of us were staring at the auroras lighting up our Instagram feeds last year, a small group of analysts at the Space ISAC were focused on something a little less… pretty. Think solar flares. Think sabotage. Think space debris with a grudge. This week, we revisit our story about the watchers who don’t get much attention. Learn about your a…
…
continue reading

1
Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths. In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from th…
…
continue reading

1
Why call one API when you can use GraphQL to call them all?
25:45
25:45
Play later
Play later
Lists
Like
Liked
25:45Apollo GraphQL lets you orchestrate APIs with a composable, declarative, self-service model. Apollo's MCP Server is now available. Connect with Matt on LinkedIn. Today we’re shouting out a Famous Question badge winner, user jkfe, for their question How to hide/show thymeleaf fields based on controller condition?.…
…
continue reading
Sudo patch your Linux systems. Cisco has removed a critical backdoor account that gave remote attackers root privileges. The Hunters International ransomware group rebrands and closes up shop. The Centers for Medicare and Medicaid Services (CMS) notifies 103,000 people that their personal data was compromised. NimDoor is a sophisticated North Korea…
…
continue reading
A vulnerability in sudo brings up concerns about feature-creep, and makes us consider alternatives. Plus Broadcom starts auditing VMware customers, and how to decide which outbound ports to open on a large network’s firewall. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Disaster Recovery with ZFS: A Practica…
…
continue reading
Mike breaks down his highlights from WWDC Coder's Socials Mike on X Mike on BlueSky Mike's Blog Coder on X Coder on BlueSky Show Discord Alice Alice Forms Alice for FoxProBy The Mad Botter
…
continue reading