Paper Discussions
…
continue reading
Vector AIs Podcasts
The Memriq AI Inference Brief – Engineering Edition is a weekly deep dive into the technical guts of modern AI systems: retrieval-augmented generation (RAG), vector databases, knowledge graphs, agents, memory systems, and more. A rotating panel of AI engineers and data scientists breaks down architectures, frameworks, and patterns from real-world projects so you can ship more intelligent systems, faster.
…
continue reading
Join Vector AI as we explore how AI agents, chatbots, and automation are transforming the way businesses work, sell, and support their customers. Whether you’re a small business owner, a marketing pro, or just AI-curious, you’ll discover how to harness intelligent automation to save time, cut costs, and boost customer satisfaction. Each episode features: 🤖 Deep dives into AI and chatbot trends 💡 Real-world business success stories 🛠 Tips for designing, training, and deploying AI agents 🔮 Fut ...
…
continue reading
Cutting through AI bullsh*t. Come join the discussion on Discord! https://discord.gg/4UNKGf3
…
continue reading
The Time4AI Show brings you the most important voices and ideas from the global artificial intelligence community. In every episode, top speakers from leading AI conferences and summits condense their presentations into a quick and insightful 5-minute format, making it easy to stay up to date with the latest AI research, tools, and applications. Hosted by Peter Mesarec, an experienced AI consultant at petermesarec.ai, this podcast is designed for professionals, researchers, and enthusiasts w ...
…
continue reading
Each episode of Discursive takes one idea — from open source to FinOps, from AI agents to cloud cost models — and unpacks it through the lens of decades spent building the web, scaling infrastructure, and writing about how technology actually evolves. Recorded in Seattle, Discursive is a ten-minute conversation about where software has been and where it’s heading — across cloud, FinOps, open source, AI, and the culture that connects them.
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
A podcast about the principles and practices of interface design.
…
continue reading
Hosted by Envy’s own Billy Cina, this B2B marketing podcast dives into the real, unfiltered conversations happening in boardrooms (and bedrooms), Slack channels, late-night strategy sessions and the water coolers. Whether you're building a tech startup, figuring out how to turn your marketing into actual revenue (what a concept), or looking to scale, we’ve got you covered. Expect candid banter with CMOs, VPs, and marketing leaders who know a thing or two about growing pains and what it takes ...
…
continue reading
Manufacturing Dissent since 1996
…
continue reading
Join database educator Aaron Francis as he gets schooled by database professionals.
…
continue reading
https://quranlm.com/ Mission: Bridging Divine Wisdom with Modern Intelligence. Description: Welcome to the QuranLM Podcast, the show that merges the timeless revelation of the Holy Quran with the cutting-edge capabilities of Artificial Intelligence. Our mission is to "engender further curiosity" about the Quran by exploring its text through a unique, data-driven lens. Each episode dives deep into the Divine text using advanced techniques—from uploading the Quran to the NotebookLM platform to ...
…
continue reading
Technology is reshaping society—but how are users included in the conversation? The Brave Technologist explores how emerging technologies like artificial intelligence, machine learning, and Web3 are influencing our lives, our choices, and our collective future. Unlike many tech podcasts that focus on hype and disruption, this show puts users at the center of the conversation. Each episode features thoughtful discussions with technologists working to ensure that innovation serves the public i ...
…
continue reading
Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
AI Builder Daily Brief is your five-minute shortcut to staying ahead of the world’s fastest-moving frontier: practical, builder-first artificial intelligence. Every weekday, host Ran Chen—Silicon Valley ML engineer turned product-led founder—distills a firehose of research papers, tool launches, and real-world case studies into one crisp audio espresso. No hype, no jargon—just the tactical insights you’d pick up if you worked inside an AI lab (and the mindset to ship faster than the next bre ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Tech talks by Vishnu VG. Cloud Expert | Software Architect | AWS Community Builder | Technology Blogger. Opinions are personal.
…
continue reading
This show is made for B2B marketers who are tired of the same old advice. Ugi Djuric, CEO of ContentMonk and B2B Vault, sits down with some of the best minds in B2B to talk about what’s really working, what’s broken, and what nobody tells you about growing a company. This is the show where people share their deepest insights and secret knowledge they wouldn't otherwise share on LinkedIn.
…
continue reading
Sovereign DBaaS Decoded is a podcast for IT leaders and implementers who want to understand data sovereignty and explore strategies to reliably scale their open-source database ops while maintaining control of how their data is managed and stored. In each episode, Severalnines CEO Vinay Joosery interviews industry leaders to uncover how organizations can implement open-source databases, cloud vendor-neutral environments, and tooling to address heavy workloads and mitigate business risks, inc ...
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
“How can biopharma improve?” This question is the guiding ethos of the Better Biopharma podcast. Through conversations with experts across the biopharma landscape, host Tyler Menichiello explores the work being done to make better medicines and optimize manufacturing. Each episode is a dive into the guest's methods, their curiosity, and their determination. By shining a light on the visionaries pushing the industry forward, Better Biopharma aims to inform and inspire their peers to continue ...
…
continue reading
Programming Throwdown educates Computer Scientists and Software Engineers on a cavalcade of programming and tech topics. Every show will cover a new programming language, so listeners will be able to speak intelligently about any programming language.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Broadcasting Ideas and Connecting Minds at the Intersection of Cybersecurity, Technology and Society. Founded by Sean Martin and Marco Ciappelli in 2015, ITSPmagazine is a multimedia platform exploring how technology, cybersecurity, and society shape our world. For over a decade, we've recognized this convergence as one of the most defining forces of our time—and it's more critical than ever. Our global community encourages intellectual exchange, challenging assumptions and diving deep into ...
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
A review of Bitcoin Software updates and related topics with NVK and guests.
…
continue reading
Each week Alex discusses a range of topics that relate to the investing and finance industry. As a tech-savvy adviser in a changing world, he will explore what's topical currently as well as longer-term established themes. Alex takes a lighthearted approach to educate listeners, and occasionally stray into the world of the weird and wonderful.
…
continue reading
Insights about the Software Development industry from a senior developer (with more than 20 years of experience). Short, to-the-point episodes where I share my insights. Give it a listen and see if you learn a thing or two!
…
continue reading
Search News You Can Use is Marie Haynes' Weekly Podcast where she provides useful advice on Google Algorithm updates, tips and information to help you improve your website. During the podcast she breaks down the most interesting and important changes that have happened in SEO and the world of search!
…
continue reading
The MongoDB Podcast features guest interviews including developers, startups, and founders with MongoDB Principal Developer Advocate Michael Lynn. Learn about new and emerging technology, how to use the various MongoDB products and best practices, how organizations are using MongoDB, and what lead them to choose MongoDB over other databases.
…
continue reading
my name is John, I'm a graphic designer and programmer I've been thinking about doing a podcast for some time now, but I didn't quite make the courage for it until now. This podcast will be mainy about my activity as part of the team developing MockoFun.com I will tell you a few words about what MockoFun is and what it does and then a bit about my role on the team. MockoFun is an online graphic design application. It's used for creating graphics like posters, flyers, logos and such right in ...
…
continue reading
1
Similarity Searching with Vectors (Chapter 8)
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34Unlock the power of similarity search with vectors in this episode of Memriq Inference Digest – Engineering Edition. We explore how dense and sparse vector techniques combine to enable scalable, accurate semantic retrieval for AI systems, inspired by Chapter 8 of Keith Bourne’s book. Join us and special guest Keith Bourne as we unpack the engineeri…
…
continue reading
While our team is out on winter break, please enjoy this encore episode of Threat Vector . Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking u…
…
continue reading
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoin…
…
continue reading
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
…
continue reading
1
Eyes in the sky, red flags on the ground.
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
…
continue reading
1
SE Radio 700: Mojtaba Sarooghi on Waiting Rooms for High-Traffic Events
1:07:46
1:07:46
Play later
Play later
Lists
Like
Liked
1:07:46Mojtaba Sarooghi, a Distinguished Product Architect at Queue-it, speaks with host Jeremy Jung about virtual waiting rooms for high-traffic events such as concerts and limited-quantity product releases. They explore using a virtual queue to prevent overloading systems, how most traffic is from bots, using edge workers to reduce requests to the custo…
…
continue reading
1
Navigating AI's Hidden Risks: Lessons from the Nova Bridge Chatbot Failure
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56Bhavesh Mehta and Mahesh Kumar—senior technology leaders at Uber and co-authors of the practical guide AI-First Leader—discuss the lessons learned from Nova Bridge's collapse, and share best practices for mitigating hidden risks that can derail ambitious AI projects. They also share specific ways that small businesses and Fortune 500 companies can …
…
continue reading
1
Tech Investment Strategies and Overview [CISOP]
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
…
continue reading
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
…
continue reading
1
When Data Stops Being Code and Starts Being Conversation (Ep. 297)
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Mark Brocato built Mockaroo—the tool that taught millions of developers how to fake data. Now, as Head of Engineering at Tonic.ai, he's building the AI agent that's making his own creation obsolete. In this episode, we explore why static test data can't survive the AI era, what it means to "negotiate" datasets with an agent instead of scripting the…
…
continue reading
1
120. Beyond the AI Hype: A 2025 Christmas Reflection - with Rick & Oscar
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47In this Christmas Special 2025 episode of Betatalks, Rick and Oscar reflect on how AI has moved this year from hype to practical use. They discuss real-world examples, the maturing AI ecosystem, and the challenge of adopting AI at the right time. We want to thank all our guests and listeners for an amazing year, and we hope to see you in 2026. We w…
…
continue reading
Anthony and Katie each bring some famous design phrases to discuss. Hosts: Anthony Hobday, Generalist Product Designer: https://twitter.com/hobdaydesign Katie Langerman, Design Technologist: https://twitter.com/KatieLangerman…
…
continue reading
1
Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
…
continue reading
1
The lies that let AI run amok. [Research Saturday]
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
…
continue reading
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
…
continue reading
1
Building search for AI systems with Chroma CTO Hammad Bashir
1:06:43
1:06:43
Play later
Play later
Lists
Like
Liked
1:06:43Hammad Bashir, CTO of Chroma, joins the show to break down how modern vector search systems are actually built from local, embedded databases to massively distributed, object-storage-backed architectures. We dig into Chroma’s shared local-to-cloud API, log-structured storage on object stores, hybrid search, and why retrieval-augmented generation (R…
…
continue reading
In this partnership episode between Hanselminutes and the ACM Bytecast, Scott talks with Dr. Dawn Song, MacArthur Fellow and leading researcher in computer security and AI and co-director at the Berkeley Center for Responsible Decentralized Intelligence about how privacy-preserving computation, fairness, and accountability can help us design intell…
…
continue reading
In this episode of Threat Vector, David Moulton is joined by Keith Mularski, Chief Global Ambassador at Qintel and former FBI cybercrime investigator, to explore how threat intel forged in the underground is reshaping today’s SOC. Keith shares lessons from his legendary career—undercover operations, dismantling DarkMarket, and leading some of the F…
…
continue reading
1
SE Radio 699: Benjamin Brial on Internal Dev Platforms
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17In this episode, Benjamin Brial, CEO and co-founder of Cycloid, speaks with host Sriram Panyam about internal developer platforms (IDPs) and internal developer portals. The conversation explores how these platforms address the growing challenges of DevOps scalability, multi-cloud complexity, and cloud waste, all of which organizations face as they …
…
continue reading
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Te…
…
continue reading
1
Where Has Santa Claus Gone? | A Short Christmas Story Written By Marco e Lucia Ciappelli (English Version) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart
9:44
9:44
Play later
Play later
Lists
Like
Liked
9:44Where has Santa Claus gone? Once upon a time there was Santa Claus's Village — but Santa Claus wasn't there. He had been missing for days and days… actually for months. Who would prepare and deliver gifts to the children as they did every year? That part of the North Pole which was usually very busy had become strangely silent — not an Elf could be…
…
continue reading
1
AI Adoption Without Readiness: When AI Ambition Collides With Data Reality | A TrustedTech Brand Story Conversation with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech
34:16
34:16
Play later
Play later
Lists
Like
Liked
34:16As organizations race to adopt AI, many discover an uncomfortable truth: ambition often outpaces readiness. In this episode of the ITSPmagazine Brand Story Podcast, host Sean Martin speaks with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech, about what it really takes to operationalize AI without amplifying risk, chaos, or misinf…
…
continue reading
1
Building an Intelligent Internet: AI's Future is in Specialized Agents
28:55
28:55
Play later
Play later
Lists
Like
Liked
28:55Emad Mostaque, founder and CEO of Intelligent Internet, discusses his vision for an open and intelligent internet, along with the impact it can have on everyday users. He acknowledges the risks of AI surpassing human capabilities, but shares an optimistic view of where the true strength of a society lies. He also discusses the ways communities can …
…
continue reading
1
Everyone's hiring or job-hunting... no one's happy 🥵 Job market w/ Beth Katzman & Adi Blecher
21:00
21:00
Play later
Play later
Lists
Like
Liked
21:00This isn’t another “AI is taking our jobs” conversation. This banter episode with Adi Blecher, VP Marketing at Wisor.AI and Beth Katzman, global recruitment expert, is a grounded look at how hiring expectations, budget pressure, and leadership misunderstandings are colliding and leaving marketers stuck in the middle. You’ll hear a blunt take on: Wh…
…
continue reading
1
Combining AI With Operations Research To Advance Biomanufacturing With Tinglong Dai, Ph.D., and Tugce Martagan, Ph.D.
35:28
35:28
Play later
Play later
Lists
Like
Liked
35:28In this episode of “Better Biopharma,” host Tyler Menichiello is joined by Tinglong Dai, Ph.D., Bernard T. Ferrari Professor of Business at Johns Hopkins University, and Tugce Martagan, Ph.D., associate professor at Northeastern University, to talk about the potential advancements that can be made in biomanufacturing by combining AI with operations…
…
continue reading
Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical …
…
continue reading
1
Music, People, and the Energy That Moves an Industry | The NAMM Show 2026 Event Coverage with John Mlynczak, President and CEO at NAMM | On Location with Sean Martin and Marco Ciappelli
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02As NAMM approaches its 125th year, the conversation around The NAMM Show 2026 centers less on products alone and more on the people, relationships, and creative energy that sustain the music industry. In this episode, John Mlynczak, President and CEO of NAMM, joins Sean Martin and Marco Ciappelli to frame the upcoming show as a moment shaped by res…
…
continue reading
1
The Hidden Risk Inside Your Build Pipeline: When Open Source Becomes an Attack Vector | A Conversation with Paul McCarty | Redefining CyberSecurity with Sean Martin
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14⬥EPISODE NOTES⬥ Modern application development depends on open source packages moving at extraordinary speed. Paul McCarty, Offensive Security Specialist focused on software supply chain threats, explains why that speed has quietly reshaped risk across development pipelines, developer laptops, and CI environments. JavaScript dominates modern softwa…
…
continue reading
1
The Hidden Risk Inside Your Build Pipeline: When Open Source Becomes an Attack Vector | A Conversation with Paul McCarty | Redefining CyberSecurity with Sean Martin
40:14
40:14
Play later
Play later
Lists
Like
Liked
40:14⬥EPISODE NOTES⬥ Modern application development depends on open source packages moving at extraordinary speed. Paul McCarty, Offensive Security Specialist focused on software supply chain threats, explains why that speed has quietly reshaped risk across development pipelines, developer laptops, and CI environments. JavaScript dominates modern softwa…
…
continue reading
In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, …
…
continue reading
1
Mastering The Art of Risk Management Without Losing Your Mind | A CyXcel Brand Story Conversation with Megha Kumar, Partner, Chief Product Officer & Head of Geopolitical Risk
44:13
44:13
Play later
Play later
Lists
Like
Liked
44:13Risk has always been part of doing business. What has changed is its scale, speed, and interconnected nature. In this episode, Sean Martin and Marco Ciappelli are joined by Megha Kumar, Chief Product Officer and Head of Geopolitical Risk at CyXcel, to explore how organizations can think more clearly about digital risk without becoming paralyzed by …
…
continue reading
Apple and Google issue emergency updates to patch zero-days. Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Res…
…
continue reading
1
Model Context Protocol: The Universal AI Integration Standard Explained
20:10
20:10
Play later
Play later
Lists
Like
Liked
20:10Discover how the Model Context Protocol (MCP) is revolutionizing AI systems integration by simplifying complex multi-tool interactions into a scalable, open standard. In this episode, we unpack MCP’s architecture, adoption by industry leaders, and its impact on engineering workflows. In this episode: - What MCP is and why it matters for AI/ML engin…
…
continue reading
1
Browser Native Auth and FedCM is finally here!
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44Share Episode ⸺ Episode Sponsor: Incident.io - https://dev0ps.fyi/incidentio "My biggest legacy at Google is the amount of systems I broke." — Sam Goto joins the show with a name that strikes fear into engineering systems everywhere. As a Senior Staff Engineer on the Chrome team, Sam shares the hilarious reality of having the last name "Goto," whic…
…
continue reading
1
RAG Evaluation with ragas: Reference-Free Metrics & Monitoring
26:47
26:47
Play later
Play later
Lists
Like
Liked
26:47Unlock the secrets to evaluating Retrieval-Augmented Generation (RAG) pipelines effectively and efficiently with ragas, the open-source framework that’s transforming AI quality assurance. In this episode, we explore how to implement reference-free evaluation, integrate continuous monitoring into your AI workflows, and optimize for production scale …
…
continue reading
1
Amanda Fennell: There's a cyber warrior in all of us [Information] [Career Notes]
9:33
9:33
Play later
Play later
Lists
Like
Liked
9:33Please enjoy this encore of Career Notes. Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber busin…
…
continue reading
1
Why Your AI Is Failing: The NLU Paradigm Shift CTOs Can’t Ignore
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Are your AI initiatives stalling in production? This episode uncovers the critical architectural shift brought by the Natural Language Understanding (NLU) layer and why treating AI as just another feature is setting CTOs up for failure. Learn how rethinking your entire stack—from closed-world deterministic workflows to open-world AI-driven orchestr…
…
continue reading
1
Agent Engineering Unpacked: New Discipline or Just Hype?
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02Is agent engineering the next big AI discipline or a repackaged buzzword? In this episode, we cut through the hype to explore what agent engineering really means for business leaders navigating AI adoption. From market growth and real-world impact to the critical role of AI memory and the evolving tool landscape, we provide a clear-eyed view to hel…
…
continue reading
1
Root access to the great firewall. [Research Saturday]
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
…
continue reading
1
Black Hat Europe 2025 Wrap-Up: Suzy Pallett on Global Expansion, AI Threats, and Defending Together | On Location Coverage With Sean Martin & Marco Ciappelli
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19____________Guests: Suzy Pallett President, Black Hat. Cybersecurity. On LinkedIn: https://www.linkedin.com/in/suzy-pallett-60710132/ The Cybersecurity Community Finds Its Footing in Uncertain Times There is something almost paradoxical about the cybersecurity industry. It exists because of threats, yet it thrives on trust. It deals in technical co…
…
continue reading
A new executive order targets states’ AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA…
…
continue reading
1
Procedural Memory for RAG: Deep Dive with LangMem (Chapter 18)
18:09
18:09
Play later
Play later
Lists
Like
Liked
18:09Unlock the power of procedural memory to transform your Retrieval-Augmented Generation (RAG) agents into autonomous learners. In this episode, we explore how LangMem leverages hierarchical learning scopes to enable AI agents that continuously adapt and improve from their interactions — cutting down manual tuning and boosting real-world performance.…
…
continue reading
1
Agentic Memory: Stateful RAG and AI Agents (Chapter 16)
19:27
19:27
Play later
Play later
Lists
Like
Liked
19:27Unlock the future of AI agents with agentic memory — a transformative approach that extends Retrieval-Augmented Generation (RAG) by incorporating persistent, evolving memories. In this episode, we explore how stateful intelligence turns stateless LLMs into adaptive, personalized agents capable of learning over time. In this episode: - Understand th…
…
continue reading
1
Semantic Caches: Scaling AI with Smarter Caching (Chapter 15)
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04emantic caches are transforming how AI systems handle costly reasoning by intelligently reusing prior agent workflows to slash latency and inference costs. In this episode, we unpack Chapter 15 of Keith Bourne’s "Unlocking Data with Generative AI and RAG," exploring the architectures, trade-offs, and practical engineering of semantic caches for pro…
…
continue reading