Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Ui Engineering Podcasts

show episodes
 
Artwork
 
AntStack is one of the leading full-stack serverless consulting companies aiming at disrupting the cloud computing space by providing holistic solutions to get you up and running with serverless. We specialize in providing services like application development, application modernization, UI engineering, and data engineering & modernization that empower businesses to achieve unmatched efficiency, and cost-effectiveness. Our team of experienced experts brings a wealth of knowledge to the table ...
  continue reading
 
Tristan Handy has been curating the Analytics Engineering Roundup newsletter since 2015, pulling together the internet’s best data science & analytics articles. Tristan and co-host Julia Schottenstein now bring the Roundup to real life, hosting biweekly conversations with data practitioners inventing the future of analytics engineering. You can view full episode summaries and read back issues of the Roundup newsletter at https://roundup.getdbt.com. The podcast is sponsored by dbt labs, maker ...
  continue reading
 
Welcome to The Data Flowcast: Mastering Apache Airflow ® for Data Engineering and AI— the podcast where we keep you up to date with insights and ideas propelling the Airflow community forward. Join us each week, as we explore the current state, future and potential of Airflow with leading thinkers in the community, and discover how best to leverage this workflow management system to meet the ever-evolving needs of data engineering and AI ecosystems. Podcast Webpage: https://www.astronomer.io ...
  continue reading
 
Artwork
 
Explore the world of software engineering with the Joshua Matos Show, where we dive into Spring Boot, React, Java, and TypeScript. We'll talk about how to be successful as a Software Engineer, and all the things that you should know.
  continue reading
 
Artwork
 
In The Front End, we explore the in's and out's of life as a developer. We delve into challenging topics around modern-day development and technology including learning and professional growth, programming languages, frameworks, tools, techniques, UX/UI, and careers.
  continue reading
 
Artwork

1
Stories from the Hackery

Nashville Software School

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Find out what it takes to start a career in software development, data analytics, data science, or UI/UX design from those who made the leap. Hear from musicians, veterans, single-moms, teachers, bartenders, postdocs, warehouse workers, and more - all graduates of Nashville Software School (NSS) - as they discuss their transition to tech and their capstone projects presented at Demo Day. Founded in 2012, NSS is a flourishing community of over one thousand alumni, active students, and a team ...
  continue reading
 
Artwork

1
Texplosion

Omid Mirzaee Yazdi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by Omid Mirzaee Yazdi, Fullstack Engineer at Knowit Syd, Texplosion brings you the latest and greatest in tech news, reviews and general nerdery. Whether you're a seasoned developer, a curious tech enthusiast, or just someone looking for a good laugh, this podcast has something for you. Every month we will discuss technology with an expert in the field. So grab your cup of coffee, sit back, relax, and get ready to laugh your tech-loving heart out.
  continue reading
 
Artwork

1
School of Motion Podcast

School of Motion: Design & Animation Training for MoGraph Artists

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The #1 podcast for designers who animate, animators who design, and anyone who is 3D-curious. We interview Designers, Animators, 3D Artists, Producers, Studio Owners and other folks related to motion design and creativity. We get deep into the geeky world of Adobe After Effects, Cinema 4D, Photoshop and Illustrator. We talk about the business and art of Motion Design. Dig in.
  continue reading
 
The Women in Tech Podcast is hosted by WeAreLATech's Espree Devora and features inspiring Women in Tech from Engineers, Female Founders, Investors, UX and UI Designers, Journalists all sharing their story how they got to where they are today. The purpose of the show is for every listener to walk away feeling 'If She Can Do It So Can I'. Espree calls it "actionable empowerment". Show style/content is to Startup Podcast, WeAreLATech, Nerdette, Rocket, Tim Ferriss & Recode
  continue reading
 
Artwork

1
The Shifting Privacy Left Podcast

Debra J. Farber (Shifting Privacy Left)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Shifting Privacy Left features lively discussions on the need for organizations to embed privacy by design into the UX/UI, architecture, engineering / DevOps and the overall product development processes BEFORE code or products are ever shipped. Each Tuesday, we publish a new episode that features interviews with privacy engineers, technologists, researchers, ethicists, innovators, market makers, and industry thought leaders. We dive deeply into this subject and unpack the exciting elements ...
  continue reading
 
Artwork

1
Design Daily

Austin Beck

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Design Daily! A podcast around design, creators, and life with candid conversations featuring creators across design disciplines including architects, product designers, developers, artists and others in the design realm. Hosted by myself Austin Beck. Connect with me! | austinbeck.co YouTube | https://www.youtube.com/channel/UCfmoOuX5-2XpP-kSSTeK1aw?view_as=subscriber Instagram | https://www.instagram.com/the_austinbeck/ Twitter | https://twitter.com/the_austinbeck ISSUU | https:/ ...
  continue reading
 
Loading …
show series
 
Contributing to open-source projects can be daunting, but it can also unlock unexpected innovation. This episode showcases how one engineer’s journey with Apache Airflow led to impactful UI enhancements and infrastructure solutions at scale. Shubham Raj, Software Engineer II at Cloudera, shares how his team built a drag-and-drop DAG editor for non-…
  continue reading
 
Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
  continue reading
 
The evolution of Airflow has reached a milestone with the introduction of remote execution in Airflow 3, enabling flexible orchestration across distributed environments. In this episode, Jens Scheffler, Test Execution Cluster Technical Architect at Bosch, shares insights on how his team’s need for large-scale, cross-environment testing influenced t…
  continue reading
 
Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
  continue reading
 
TLDR Matt caught whitebait for dinner during his outdoor adventures. Wing foiling is a new sport gaining popularity. Sub agents are necessary for exploring context windows in AI. A2A and MCP servers are the future of AI integration. AI-assisted code review can streamline the development process. Prompting techniques are evolving and require careful…
  continue reading
 
Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
  continue reading
 
Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
  continue reading
 
Show Description It's time for a ShopTalk GearTalk segment on video and audio upgrades, a chat about better YouTube thumbnails, buying the $200 Yamaha guitar (or equivalent in other areas of life), Chris and Dave riff on CSS modules, and what's your social media ethos in 2025? Listen on Website → Links how to make a killer thumbnail (for the 2025 a…
  continue reading
 
Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
  continue reading
 
What does it mean to be agentic? Is there a spectrum of agency? In this episode of The Analytics Engineering Podcast, Tristan Handy talks to Sean Falconer, senior director of AI strategy at Confluent, about AI agents. They discuss what truly makes software "agentic," where agents are successfully being deployed, and how to conceptualize and build a…
  continue reading
 
Justin Keyes Blog: https://sink.io/ Github: https://github.com/justinmk X: https://x.com/justinmk?lang=en Youtube: https://www.youtube.com/@justinkz Wookash Podcast Show links: https://podcasters.spotify.com/pod/show/lukasz-sciga Spotify: https://open.spotify.com/show/7tExkDJcI6vvmpCguX8Ygd Apple Podcasts: https://podcasts.apple.com/us/podcast/wook…
  continue reading
 
Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
  continue reading
 
In this episode, Scott Hanselman sits down with benny Vasquez, Chair of the AlmaLinux OS Foundation, to explore the project's journey since the shift away from CentOS. benny shares insights into how AlmaLinux stays community-driven, transparent, and enterprise-ready—all while navigating the evolving world of open-source licensing. It's a candid and…
  continue reading
 
Managing modern data platforms means navigating a web of complex infrastructure, competing team needs and evolving security standards. For data teams to truly thrive, infrastructure must become both accessible and compliant without sacrificing velocity or reliability. In this episode, we’re joined by Cory O’Daniel, CEO and Co-Founder at Massdriver,…
  continue reading
 
Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
  continue reading
 
In this episode of Stories from the Hackery, we explore the emerging field of data engineering with NSS alumni Teresa Whitesell and Joshua Rio-Ross. They share their career journeys and how their education in data analytics and data science set a solid foundation for their data engineering roles. Teresa discusses the critical role of data engineeri…
  continue reading
 
Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
  continue reading
 
Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
  continue reading
 
Show Description Tim Farnam stops by to talk with Chris and Dave about his new project, Hot Page, and why and how he started building it after working in print and web news. (20% discount code for the Design Tokens Course: SHOPTALKSHOWISAWESOME) Listen on Website → Guests Tim Farnam Guest's Main URL • Guest's Social Creative coder based in Mexico C…
  continue reading
 
Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
  continue reading
 
Etay Meiri joins me to talk about real-time graphics, performance, and teaching OpenGL online. From integrated GPUs to shaders and the tradeoffs between Vulkan and OpenGL — this is a deep dive into the math, mindset, and challenges behind graphics programming. If you want to know what it takes to teach complex topics simply and how today’s tools ar…
  continue reading
 
New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
  continue reading
 
In this episode of Hanselminutes, Scott Hanselman chats with Brenda Darden Wilkerson, the President and CEO of AnitaB.org, about her journey in technology and advocacy for diversity, equity, and inclusion in the tech industry. Brenda shares her inspiring story of entering computer science by accident, overcoming societal perceptions, and her impact…
  continue reading
 
Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
  continue reading
 
Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
  continue reading
 
Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
  continue reading
 
Show Description Dave's coming in hot from vacation, how CodePen's new editor imports packages, should CodePen fix your code if you forgot something, the struggle to get the right context in the console, Chris is still shopping for an Arc replacement, and the struggles with inspiration driven engineering. (20% discount code for the Design Tokens Co…
  continue reading
 
SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
  continue reading
 
In this season of the Analytics Engineering podcast, Tristan is deep into the world of developer tools and databases. If you're following us here, you've almost definitely used Amazon S3 it and its Blob Storage siblings. They form the foundation for nearly all data work in the cloud. In many ways, it was the innovations that happened inside of S3 t…
  continue reading
 
Legendary graphics programmer Sean Barrett shares his remarkable journey — starting in early game development, pushing graphics boundaries at Looking Glass Studios, and later creating the iconic STB libraries. We explore everything from postscript printers to portal engines and pioneering indie game jams. This episode dives deep into the technical …
  continue reading
 
News The pod has twitter/x - https://x.com/badagentpod Wil’s new brand - tritanclub.com Links Boris Tane post on Cloudflare DOs + Drizzle - https://boristane.com/blog/durable-objects-database-per-user/ Experience with Claude Code - https://sankalp.bearblog.dev/my-claude-code-experience-after-2-weeks-of-usage/ Focus on inputs not outputs: https://jo…
  continue reading
 
Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
  continue reading
 
In this episode of Hanselminutes, Scott Hanselman talks with Randall Hyde, renowned for his expertise in programming and assembly language. Known as the creator of the Lisa Assembler and the author of The Art of Assembly Language and Write Great Code series, Randall shares his journey from developing in assembler for early computing systems to work…
  continue reading
 
Telemetry has the potential to guide the future of Airflow, but only if it’s implemented transparently and with community trust. In this episode, we’re joined by Bolke de Bruin, Director at Metyis and a long-time Airflow PMC member. Bolke discusses how telemetry has been handled in the past, why it matters now and what it will take to get it right.…
  continue reading
 
More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
  continue reading
 
Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
  continue reading
 
DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
  continue reading
 
Show Description Chris and Dave chat about whether you should wing it or script your videos, unplanned demos versus the safety net of edited videos, streaming software with Ecamm Live vs OBS vs Streamlabs, new CSS animation composition, and anchor positioning thoughts. (20% discount code for the Design Tokens Course: SHOPTALKSHOWISAWESOME) Listen o…
  continue reading
 
Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
  continue reading
 
“UI is so over” “If all humans were perfect robots” "I just got stoned and did open source." "I rewrote their entire CLI." Sunil Pai's Backstory and Career Journey from India to London The Evolution of React and Sunil's Contributions Transition to Cloudflare and the Concept of Durable Objects Building PartyKit and Its Impact The Role of AI Agents a…
  continue reading
 
Join Pete Hunt (CEO, Dagster Labs) and Jeevan Dongre (CEO, AntStack) as they unpack the journey from shaping React at Facebook to transforming modern data infrastructure with Dagster. This episode explores the evolution of developer tools, open-source ecosystems, and the changing landscape of data engineering — not just through code, but through a …
  continue reading
 
In this episode, Jeevan Dongre (CEO, AntStack) and Prashanth HN (CTO, AntStack) explore why most GenAI initiatives in healthcare are falling short, and what it really takes to build accurate, secure, and production-ready AI systems. From messy data and hallucinating models to the misuse of LLMs and the power of serverless agents, this conversation …
  continue reading
 
SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
  continue reading
 
In this episode of Hanselminutes, Scott Hanselman chats with Roderick Rabah, Head of Product at Postman Flows, about the evolution of software development, the intersection of APIs and AI, and finding the "right layer of abstraction" for problem-solving. Drawing on his deep expertise in compiler optimization, distributed systems, and serverless com…
  continue reading
 
Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play