Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Technical interviews about software topics.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
A podcast about web design and development.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
next generation web podcast
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Exploring the observability side of software development.
…
continue reading
Software engineers, architects and team leads have found inspiration to build better, high performing teams by listening to the weekly InfoQ Podcast. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 500,000 downloads in the last 3 years.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
A place for elite leaders and teams.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
Why do we make games? Every designer has a different and very personal answer to that question. Soren Johnson, founder of Mohawk Games, sits down with noted designers to find out by examining their careers as a whole.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Learn from the superstars turning content into cash! From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for co ...
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
…
continue reading
The Python Test Podcast hosted by Brian Okken
…
continue reading
A biweekly podcast on the Django Web Framework by Will Vincent and Carlton Gibson.
…
continue reading
We talk about everything to do with coding bootcamps and technology education, including gender parity, scholarships, and the latest industry news.
…
continue reading
Jake Bennett and Michael Dyrynda conquer a 14.5 hour time difference to talk about life as web developers
…
continue reading

1
Improving on a 30-year-old hardware architecture
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54SambaNova makes a full-stack AI platform and an “intelligent chip” capable of running models of up to five trillion parameters, allowing developers to run state-of-the-art open source models without the time-consuming work of tuning and modeling. See what developers are building with the tech. Find Rodrigo on LinkedIn. This episode was recorded at …
…
continue reading

1
Mic Drop: Gen. Charlie "Tuna" Moore: Cyber Wars Don’t Wait for Consensus
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21Military decisions used to take months — maybe even years. Cyber warfare decisions can happen in milliseconds. Lt. General Charlie “Tuna” Moore, former Deputy Commander of U.S. Cyber Command, explains soldiers without cyber skills are already a step behind. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
Chasing that next BIG thing (Interview)
1:38:40
1:38:40
Play later
Play later
Lists
Like
Liked
1:38:40Drew Wilson is back! It’s been more than a decade since Adam and Drew have spoken and wow, Drew has been busy. He built Plasso and got acquired by GoDaddy. He built a bank called Letter which didn’t work out…and now he’s Head of Design at Clerk and back to chasing that next big thing. Join the discussion Changelog++ members save 6 minutes on this e…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
Making SNES ROMS with C# and Matthew Shapiro's DotnetSnes
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33What if you could craft Super Nintendo ROMs using the power of C#? In this episode, Scott Hanselman dives into the world of retro game development with Matthew Shapiro, the creator of DotnetSnes—a tool that enables developers to build SNES games with modern .NET technology. They explore how the project works, the challenges of programming for class…
…
continue reading
Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France ac…
…
continue reading
Carson Gross, creator of HTMX, talks about its evolution from intercooler.js, its viral rise on social media, and its philosophy of simplicity and stability. They dive into how HTMX fits into the modern web dev ecosystem, the idea of building 100-year web services, and why older technologies like jQuery and server-side rendering still have staying …
…
continue reading

1
How Much Should Salespeople Know About Their Product?
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is Jay Jay Davey, vp of cyber security operations, Planet. In this episode: Aligning incentives T…
…
continue reading
LiveKit is a platform that provides developers with tools to build real-time audio and video applications at scale. It offers an open-source WebRTC stack for creation of live, interactive experiences like video conferencing, streaming, and virtual events. LiveKit has gained significant attention for its partnership with OpenAI for the Advanced Voic…
…
continue reading

1
Scattered Spider extradition, Telecom hack warnings, Impersonation scammer takedown
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10Alleged ‘Scattered Spider’ member extradited to U.S. Experts see little progress after major Chinese telecom hack Polish police take down impersonation scammers Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks…
…
continue reading

1
Take Back Your Time - Volatility, Pliability, and Agency and Your Obligations.mp3
14:30
14:30
Play later
Play later
Lists
Like
Liked
14:30This episode provides tactical ways to own your time, reduce meeting load and obligations, and regain agency, especially when feeling burnt out. You'll learn how to use a simple two-part model focusing on Pliability and Volatility to evaluate your tasks and meetings and make intentional choices about how you spend your time. Learn how owning your t…
…
continue reading

1
How do you gain “experience” in cyber without a job in cyber? [CISO Persepctives]
41:47
41:47
Play later
Play later
Lists
Like
Liked
41:47We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber car…
…
continue reading

1
572: Close To Your Customers with Sarah Merlin
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08Chad talks with Sarah Merlin of IndiMade about what goes into revitalising an e-commerce platform and how they’re staying true to their customers. Discover the challenges involved with such a big migration and the efforts needed to bring it into the modern day, the importance of communication with your team at all times, as well as well as the core…
…
continue reading

1
Exploring the fundamentals of software engineering
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51You might think you know software engineering, but what are the really fundamental elements? What are the concepts, ideas and practices that are completely essential? What makes software engineering what it is? Thoughtworker Nate Schutta and Dan Vega are attempting to address those questions in their upcoming book with O'Reilly, The Fundamentals of…
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading

1
The Open Source Maintenance Fee with Rob Mensching
1:06:00
1:06:00
Play later
Play later
Lists
Like
Liked
1:06:00Open Source Maintainers are burning out or going commercial - how do we solve this? Carl and Richard chat with Rob Mensching about his work to create the open source maintenance fee through GitHub. Rob talks about the common problem of single maintainers getting buried under issues and demands of consumers for a project. Recognizing that most peopl…
…
continue reading
DHS Secretary Kristi Noem justifies budget cuts in her RSAC keynote. The EFF pens an open letter to Trump backing Chris Krebs. Scattered Spider is credited with the Marks & Spencer cyberattack. Researchers discover a critical flaw in Apple’s AirPlay protocol. The latest CISA advisories. On our Industry Voices segment, we are joined by Neil Gad, Chi…
…
continue reading

1
Driving Innovation and Unlocking the Power of GenAI
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26"Partnerships make a lot of sense to me … I feel that if two different parties come together and align on goals, then there are so many wonderful things that you can do." Today’s conversation between Adam and Benjamin Perlzweig, EMEA and DACH partner development manager at Atlassian, explores a wide range of topics. The discussion covers Atlassian’…
…
continue reading

1
898: Every Developer Needs a 3D Printer
1:05:15
1:05:15
Play later
Play later
Lists
Like
Liked
1:05:15Wes and Scott talk all things 3D printing—from fixing every day items to organizing tools, printing gadgets, and even teaching their kids entrepreneurship. Show Notes 00:00 Welcome to Syntax! 03:34 Brought to you by Sentry.io 05:03 Practical uses of 3D printing 07:34 Creating tools for organization Gridfinity 10:33 Improving and adapting everyday i…
…
continue reading
DjangoCon Europe 2025 DjangoCon Europe on YouTube - subscribe to be notified when talks are posted Get Started With AI Assistant in PyCharm neapolitan - Quick CRUD views for Django Django Social Django Events Foundation of North AmericaBy Will Vincent
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading
In episode 80 of o11ycast, Ken Rimple and Jessica Kerr chat with Kent Beck about the emerging world of AI-assisted coding. Beck shares his experiences with "augmented coding," discussing the benefits, challenges, and the evolving relationship between developers and AI agents. They explore how these tools are changing software development practices …
…
continue reading

1
Apple Airplay-Enabled Devices Can Be Hacked, Google tracked 75 zero days, France ties Russian APT28 hackers to 12 cyberattacks
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi Google tracked 75 zero days exploited in the wild in 2024 France ties Russian APT28 hackers to 12 cyberattacks on French orgs Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect b…
…
continue reading

1
Cybersecurity Incidents: Musk's Staffers, Canadian Power Utility Attack, and Massive Password Leak
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity events. Two members of Elon Musk's 'Department of Government Efficiency' reportedly gained access to classified US nuclear networks, though accounts were never activated. Nova Scotia Power faces a cyber attack affecting customer services but not critical inf…
…
continue reading

1
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
…
continue reading

1
SE Radio 666: Eran Yahav on the Tabnine AI Coding Assistant
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05Eran Yahav, Professor of Computer Science at Technion, Israel, and CTO of Tabnine, speaks with host Gregory M. Kapfhammer about the Tabnine AI coding assistant. They discuss how the design and implementation allows software engineers to use code completion and perform tasks such as automated code review while still maintaining developer privacy. Er…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading
RSAC 2025 is well under way, and Kevin the Intern files his first report. Authorities say Spain and Portugal’s massive power outage was not a cyberattack. Concerns are raised over DOGE access to classified nuclear networks. The FS-ISAC launches the Cyberfraud Prevention Framework. Real-time deepfake fraud is here to stay. On today’s Threat Vector, …
…
continue reading

1
The Case For Steward Ownership And Open Source With Melanie Rieback
44:11
44:11
Play later
Play later
Lists
Like
Liked
44:11Episode Summary Is the traditional Silicon Valley startup model harming the security industry? In this episode of The Secure Developer, Danny Allan talks with Melanie Rieback, founder of Radically Open Security, about shaking up the industry with nonprofit business models. Tuning in, you’ll learn about the inner workings of Radically Open Security …
…
continue reading

1
Tactical Tuesday: Adopting Agile in Hardware
2:11
2:11
Play later
Play later
Lists
Like
Liked
2:11Organizations building hardware products realize the need to adopt Agile ways of working. But many struggle with how to do it. In this episode, Rune Christensen, a strategic advisor with Scaled Agile shares his advice and experience around what experiments to run and investments to make. Like what you hear? Connect with Rune on LinkedIn. Explore SA…
…
continue reading

1
Get ALL the Challenges of Cybersecurity AND Fewer Resources
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Charles Blauner, formerly of Team8 (at time of recording) and now operating partner, Crosspoint Capital. In this episode: Expanding collective defense Getting tal…
…
continue reading

1
SED News: CoreWeave IPO, Anthropic’s MCP, and Microsoft Turns 50
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15Welcome to the pilot episode of SED News, a new podcast series from Software Engineering Daily. Join hosts Gregor Van and Sean Falconer as they break down the week’s most important stories in software engineering, machine learning, and developer culture. In this episode, Gregor and Sean discuss the CoreWeave IPO and the company’s recent acquisition…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading
In late 2023, Nick Lawler got a call from someone claiming to be an FBI agent. The man said that the utility Nick ran in Littleton, Massachusetts, was the target of an elaborate, international hacking operation. It set off an unlikely series of events that involved a small community, Chinese state hackers and the quiet threat hiding in our most bas…
…
continue reading

1
Uyghur software malware, DDoS jumps, 4chan back
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37Uyghur Language Software Hijacked to Deliver Malware Cloudflare sees a big jump in DDoS attacks 4chan back online Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a d…
…
continue reading

1
461: Writing new vs existing code with Sara Jackson
42:20
42:20
Play later
Play later
Lists
Like
Liked
42:20Joël talks with fellow thoughtboter Sara about the different ways developers can help one another across the various stages of an app’s lifecycle. They highlight the importance of utilising notes early on to clarify your work for others who may need it later down the line, how tooling can aid with this at all stages of development, and what lessons…
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading

1
“We’re not replacing you; we’re with you”: Where AI meets infrastructure
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22The Geminus platform is built to automatically integrate data, physics, and computation for autonomous control of complex systems. Explore the platform or get in touch. Find Greg on LinkedIn.By Greg Fallon, Ryan Donovan
…
continue reading
A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers to stay home following a cyberattack. VeriSource Services discloses a b…
…
continue reading

1
Defensive Security Podcast Episode 304
1:02:48
1:02:48
Play later
Play later
Lists
Like
Liked
1:02:48In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss the latest trends in cybersecurity, focusing on the rise of BEC scams and the significant losses attributed to cybercrime in 2024. They explore emerging threats, including social engineering tactics and hardware vulnerabilities, particularly in management i…
…
continue reading
Zach Bellay tells us about the devil and the angel on his shoulders, Pete Koomen thinks today’s AI apps are like horseless carriages, Hyperwood is an open source system for crafting furniture from simple wooden slats, Scott Antipa agrees with YAGNI but adds YAGRI & Antony Henao debunks three common myths that get engineers stuck. View the newslette…
…
continue reading

1
Episode 458: Infinite tech debt hack and figuring out what is going on
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00In this episode, Dave and Jamison answer these questions: Nearly every time certain developers on the team want to address technical debt, they end up just adding more technical debt. Of course, after one round of addressing technical debt, the developers in question believe that yet another round of redesigning and refactoring is in order. This st…
…
continue reading

1
897: Making Your App Feel Faster Than It Really Is
35:04
35:04
Play later
Play later
Lists
Like
Liked
35:04Scott and Wes break down the tricks and techniques for making your app feel blazing fast—even when it’s not. From optimistic UI to preload-on-hover, it’s all about perception, not just performance. Show Notes 00:00 Welcome to Syntax! 01:12 Brought to you by Sentry.io. 02:34 Mousedown or pointerdown events. 06:00 UI animations should be fast. 08:00 …
…
continue reading

1
InfoQ Architecture and Design Trends in 2025
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00The panel discussion in this episode is one half of the annual InfoQ Architecture and Design Trends Report. The other half is the written report .One of the regular features of InfoQ are the trends reports, which each focus on a different aspect of software development. These reports provide the InfoQ readers with a high-level overview of the topic…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
662: Alternative Browsers, Discord vs Circle, and AI in the Browser
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00Show Description We're talking browsers and discussing alternative options like Vivaldi and Brave, the implications of Chrome's potential sale to OpenAI, the impact of AI on browser functionality, Discord vs Circle, and building with Hotwire. Listen on Website → Links Newfangled Browser Alternatives – Frontend Masters Blog Zen Browser Horse Browser…
…
continue reading

1
Adrienne Braganza Tacke: Code Review Patterns & Principles - Episode 347
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16Adrienne Braganza Tacke is an accomplished author and software engineer with a passion for educating others about software development. Choosing a path distinct from the expected trajectory of nursing, she pursued a degree in management information systems at the University of Nevada, Las Vegas. Over the course of nearly eight years in the field, s…
…
continue reading

1
SAP zero-day active, another OAuth exploit, cybersecurity CEO arrested
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21SAP zero-day vulnerability under widespread active exploitation Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts Cybersecurity firm CEO charged with installing malware on hospital systems Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity control…
…
continue reading