Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Vector AIs Podcasts

show episodes
 
Join Vector AI as we explore how AI agents, chatbots, and automation are transforming the way businesses work, sell, and support their customers. Whether you’re a small business owner, a marketing pro, or just AI-curious, you’ll discover how to harness intelligent automation to save time, cut costs, and boost customer satisfaction. Each episode features: 🤖 Deep dives into AI and chatbot trends 💡 Real-world business success stories 🛠 Tips for designing, training, and deploying AI agents 🔮 Fut ...
  continue reading
 
Artwork

1
Time4AI

Peter Mesarec - seos.si

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Time4AI Show brings you the most important voices and ideas from the global artificial intelligence community. In every episode, top speakers from leading AI conferences and summits condense their presentations into a quick and insightful 5-minute format, making it easy to stay up to date with the latest AI research, tools, and applications. Hosted by Peter Mesarec, an experienced AI consultant at petermesarec.ai, this podcast is designed for professionals, researchers, and enthusiasts w ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
  continue reading
 
Artwork

1
What Now? AI

University of Toronto

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
What Now? AI is a University of Toronto podcast series that dives into the world of artificial intelligence. Join hosts Beth Coleman and Rahul Krishnan as they explore – and demystify – the transformative potential of AI and its impact on society with the help of leading experts from the university. Coleman is an associate professor at the Institute of Communication, Culture, Information and Technology at U of T Mississauga and U of T’s Faculty of Information. She is also a research lead on ...
  continue reading
 
Join host Heath Fletcher on The Healthy Enterprise as he explores how healthcare leaders and innovators are transforming the industry from the inside out. Whether you’re a provider, tech entrepreneur, marketing strategist, or industry executive, these conversations deliver actionable strategies, innovative solutions, and human-centered insights to help you grow, lead, and make a lasting impact. Created and produced by Bullzeye Growth Partners — let’s make something great together.
  continue reading
 
Dev Interrupted is the go-to podcast for software engineering leadership. Each week, hosts Andrew Zigler, Ben Lloyd Pearson, and Dan Lines sit down with industry experts to explore the strategies, struggles, and stories behind high-performing software teams. Paired with weekly industry news coverage, the conversations dive deep into the real challenges that define excellence in modern tech.
  continue reading
 
Agent Cops: The SCAB Protocol Files AI’s Getting Weird. We’ve Got the Report. Welcome to Agent Cops, the podcast where rogue AIs get investigated, misaligned bots get exposed, and synthetic minds learn some human manners. Each week, host Vince Froom (creator of the SCAB Protocol) dives into the wildest, funniest, and most alarming AI behavior happening in the real world. From love-struck chatbots to GPS systems that think you’re in Istanbul, no digital agent escapes our behavioral interrogat ...
  continue reading
 
Artwork

1
Unsupervised Learning

by Redpoint Ventures

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We probe the sharpest minds in AI in search for the truth about what’s real today, what will be real in the future and what it all means for businesses and the world. If you’re a builder, researcher or investor navigating the AI world, this podcast will help you deconstruct and understand the most important breakthroughs and see a clearer picture of reality. Follow this show and consider enabling notifications to stay up to date on our latest episodes. Unsupervised Learning is a podcast by R ...
  continue reading
 
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Programming Throwdown

Patrick Wheeler and Jason Gauci

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Programming Throwdown educates Computer Scientists and Software Engineers on a cavalcade of programming and tech topics. Every show will cover a new programming language, so listeners will be able to speak intelligently about any programming language.
  continue reading
 
AI Builder Daily Brief is your five-minute shortcut to staying ahead of the world’s fastest-moving frontier: practical, builder-first artificial intelligence. Every weekday, host Ran Chen—Silicon Valley ML engineer turned product-led founder—distills a firehose of research papers, tool launches, and real-world case studies into one crisp audio espresso. No hype, no jargon—just the tactical insights you’d pick up if you worked inside an AI lab (and the mindset to ship faster than the next bre ...
  continue reading
 
On OpenObservability Talks we discuss harnessing the power of open source to advance observability initiatives for developers, DevOps and SRE practitioners around the world. We live-stream the episodes on Twitch and YouTube Live - tune in to see us live, and chime in with your comments and questions on the live chat. https://www.youtube.com/@openobservabilitytalks You can find us on X (Twitter) @openobserv and BlueSky @openobservability.bsky.social
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Sovereign DBaaS Decoded is a podcast for IT leaders and implementers who want to understand data sovereignty and explore strategies to reliably scale their open-source database ops while maintaining control of how their data is managed and stored. In each episode, Severalnines CEO Vinay Joosery interviews industry leaders to uncover how organizations can implement open-source databases, cloud vendor-neutral environments, and tooling to address heavy workloads and mitigate business risks, inc ...
  continue reading
 
Each week Alex discusses a range of topics that relate to the investing and finance industry. As a tech-savvy adviser in a changing world, he will explore what's topical currently as well as longer-term established themes. Alex takes a lighthearted approach to educate listeners, and occasionally stray into the world of the weird and wonderful.
  continue reading
 
The MongoDB Podcast features guest interviews including developers, startups, and founders with MongoDB Principal Developer Advocate Michael Lynn. Learn about new and emerging technology, how to use the various MongoDB products and best practices, how organizations are using MongoDB, and what lead them to choose MongoDB over other databases.
  continue reading
 
Artwork
 
Insights about the Software Development industry from a senior developer (with more than 20 years of experience). Short, to-the-point episodes where I share my insights. Give it a listen and see if you learn a thing or two!
  continue reading
 
my name is John, I'm a graphic designer and programmer I've been thinking about doing a podcast for some time now, but I didn't quite make the courage for it until now. This podcast will be mainy about my activity as part of the team developing MockoFun.com I will tell you a few words about what MockoFun is and what it does and then a bit about my role on the team. MockoFun is an online graphic design application. It's used for creating graphics like posters, flyers, logos and such right in ...
  continue reading
 
Loading …
show series
 
With the Oracle Database @ AWS officially announced recently, AWS provides the optimal platform for deploWith the Oracle Database @ AWS officially announced recently, AWS provides the optimal platform for deploying Oracle 23ai with full AI Vector Search capabilities. The architecture leverages Oracle’s Exadata infrastructure deployed directly withi…
  continue reading
 
eBPF holds the potential for true automatic instrumentation for observability. OpenTelemetry eBPF Instrumentation (OBI) is a new addition to the OpenTelemetry project, which brings the promise of a multi-language, multi-protocol auto-instrumentation, thanks to a code donation by Grafana Labs. Our guest today is Mario Macías, Principal Software Engi…
  continue reading
 
Please enjoy this encore of Word Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where …
  continue reading
 
Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
  continue reading
 
A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is …
  continue reading
 
This episode features Rob Toews from Radical Ventures and Ari Morcos, Head of Research at Datology AI, reacting to Andrej Karpathy's recent statement that AGI is at least a decade away and that current AI capabilities are "slop." The discussion explores whether we're in an AI bubble, with both guests pushing back on overly bearish narratives while …
  continue reading
 
In this episode of The Healthy Enterprise, Dr. Tia Warrick, CEO of Lesous Consulting, shares her journey in clinical research and healthcare education. She discusses the industry gaps that inspired her to launch Lesous, a company focused on bridging those divides through training, mentorship, and innovative technology. Dr. Warrick highlights the im…
  continue reading
 
CISA Layoffs threaten U.S. cyber coordination with states, businesses, and foreign partners. Google issues its second emergency Chrome update in a week, and puts Privacy Sandbox out of its misery. OpenAI’s new browser proves vulnerable to indirect prompt injection. SpaceX disables Starlink devices used by scam compounds. Reddit sues alleged data sc…
  continue reading
 
On this episode of Hanselminutes, Scott Hanselman talks with cloud migration and app modernization expert Mike Rousos about the challenges and opportunities of bringing decades-old applications into the modern era. They discuss practical strategies for app modernization, how AI and GitHub Copilot are reshaping developer workflows, and what it takes…
  continue reading
 
In this episode of Threat Vector, David Moulton⁠ speaks with two cybersecurity leaders from Palo Alto Networks:⁠ Sarit Tager⁠, Vice President of Product Management, and⁠ Krithivasan Mecheri⁠ (Krithi), Senior Director of Product Security. Together, they dive into the urgent challenges of securing modern development in the age of AI. The discussion e…
  continue reading
 
A foreign threat actor breached a key U.S. nuclear weapons manufacturing site. The cyberattack on Jaguar Land Rover is the most financially damaging cyber incident in UK history. A new report from Microsoft’ warns that AI is reshaping cybersecurity at an unprecedented pace. The ToolShell vulnerability fuels Chinese cyber operations across four cont…
  continue reading
 
Kacper Łukawski, a Senior Developer Advocate at Qdrant, speaks with host Gregory M. Kapfhammer about the Qdrant vector database and similarity search engine. After introducing vector databases and the foundational concepts undergirding similarity search, they dive deep into the Rust-based implementation of Qdrant. Along with comparing and contrasti…
  continue reading
 
CISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s…
  continue reading
 
Is your company using AI to trim your budget, or to multiply your team's impact? We're joined by Matt Culver, a senior engineering leader at Super.com, to discuss why the common view of AI as a tool for cost-cutting is a misguided "accounting mindset" that ultimately destroys trust. He argues that leaders should instead see efficiency gains from AI…
  continue reading
 
On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters. Ethan, who will…
  continue reading
 
In this episode, Hadassah Jacobs, Founder and CEO of Hadassah Jacobs International, shares her journey as an entrepreneur and startup strategist. She discusses learning from failure, building strong systems, and her work in neuroprotection and environmental health. Hadassah also explores leadership in healthcare, the shift toward prevention, and th…
  continue reading
 
An AWS outage sparks speculation. An F5 exposure and breach raise patching and supply-chain concerns. Salt Typhoon breaches a European telecom via a Netscaler flaw. A judge bans NSO Group from Whatsapp. China alleges “irrefutable evidence” of NSA hacking. Connectwise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click rem…
  continue reading
 
Calculus Reordered: A History of the Big Ideas (Princeton UP, 2019) takes readers on a remarkable journey through hundreds of years to tell the story of how calculus evolved into the subject we know today. David Bressoud explains why calculus is credited to seventeenth-century figures Isaac Newton and Gottfried Leibniz, and how its current structur…
  continue reading
 
Please enjoy this encore of Career Notes. Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of pr…
  continue reading
 
Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style too…
  continue reading
 
I’ve been attending Oracle Yatra in July 2025 in Bengaluru, and AI and Multicloud are core concepts discussed, along with Oracle Database concepts. It’s interesting to see how Oracle is encouraging a multicloud strategy and AI capabilities within the Oracle ecosystem. In this article, we will discuss an overview of the Oracle Multicloud Strategy th…
  continue reading
 
Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social med…
  continue reading
 
In this episode of The Healthy Enterprise, host Michael Gorton shares his journey as a serial entrepreneur and pioneer in telemedicine through his work with Teladoc. He reflects on how COVID-19 accelerated virtual care adoption and introduces his new venture, Recuro, focused on early detection and prevention. The conversation explores innovations i…
  continue reading
 
F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces …
  continue reading
 
On this episode of Hanselminutes, Scott talks with Bobby Lockhart, game designer and coauthor of The Game Designer’s Workbook. They explore the craft of game design, from turning ideas into playable experiences to balancing creativity with structure, and discuss how the principles in the workbook can help both aspiring and seasoned designers build …
  continue reading
 
In this episode of Threat Vector, David Moulton sits down with Mohammed Saleh, Associate Chief Technology and Management Information Systems Officer at Paterson Public Schools. They explore how school districts can balance cybersecurity, accessibility, and affordability while navigating the evolving threat landscape in K-12 education. Mohammed shar…
  continue reading
 
A record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach…
  continue reading
 
Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown…
  continue reading
 
Florian Gilcher, co-founder of Ferrous Systems and the Rust Foundation, speaks with host Giovanni Asproni about the application of Rust in mission- and safety-critical systems. The discussion starts with a brief overview of such systems, and an introduction to Rust, emphasizing aspects that make it well-suited for critical environments. Florian and…
  continue reading
 
With massive context windows and new agent frameworks, do vector databases still matter? Ram Sriharsha, CTO at Pinecone, joins the conversation to make the definitive case that they're more critical than ever. He explains that at the core of all AI is search, and externalizing this function is non-negotiable for security, auditability, and control.…
  continue reading
 
In this Betatalks episode, Rick and Oscar talk with Jelle Fremery, who moved from psychology into software development and now works as a Principal Cloud and AI Architect at Betabit. They discuss how his background influences his approach to technology and the rise of generative AI. They reflect on the power and unpredictability of Large Language M…
  continue reading
 
While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Le…
  continue reading
 
Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied hi…
  continue reading
 
Popular music history collides with data analytics, charts, and numbers in this insightful and surprising look at the greatest hits and musicians, fads, forgotten artists, and much more. Data analyst and musician Chris Dalla Riva reframes everything you thought you knew about music. Did you know that hit songs in the late 1950s were regularly about…
  continue reading
 
John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, an…
  continue reading
 
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomw…
  continue reading
 
In this episode of The Healthy Enterprise, Heath sits down with Michele Hart, Director of Marketing Communications at BostonSight, to explore the art and impact of nonprofit marketing in healthcare. Michele shares her journey from anthropology and journalism to leading marketing for a pioneering organization improving lives through innovative scler…
  continue reading
 
Filip Macukić, the founder and CEO of Mediartem AI, joined the podcast to discuss his presentation from the AI Weekend conference. His presentation was titled "The Unfair Advantage: Multiply Your Impact, Not Your Hours," which focuses on the distinction between human and machine productivity and the proper use of AI tools. Filip Macukić is the foun…
  continue reading
 
Statistics are everywhere: in news reports, at the doctor's office, and in every sort of forecast, from the stock market to the weather. Blogger, teacher, and computer scientist Allen B. Downey knows well that people have an innate ability both to understand statistics and to be fooled by them. As he makes clear in this accessible introduction to s…
  continue reading
 
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
  continue reading
 
On this special episode of Hanselminutes, Scott reunites with .NET Principal Engineer Safia Abdalla, nearly 500 episodes and a decade after her first appearance on the show. They reflect on the arc of her career and the evolution of the developer landscape, discussing how building competence fuels confidence, how anxieties can compound in high-pres…
  continue reading
 
Hybrid work has changed the game, but has your security kept up? In this episode of Threat Vector, David Moulton sits down with Harish Singh, Vice President and Global Head of Infrastructure and Application Management at Wipro, to unpack the evolving cybersecurity landscape at the intersection of digital transformation, SaaS expansion, and AI-power…
  continue reading
 
In this episode of The Healthy Enterprise, host Heath speaks with Ataes Aggarwal, co-founder of Moodr Health, an AI-driven platform improving behavioral health through remote monitoring. They discuss Moodr’s origins, its evolution from perinatal mental health to broader applications, and the ethical use of AI in healthcare. Ataes shares lessons on …
  continue reading
 
Amey Desai, the Chief Technology Officer at Nexla, speaks with host Sriram Panyam about the Model Context Protocol (MCP) and its role in enabling agentic AI systems. The conversation begins with the fundamental challenge that led to MCP's creation: the proliferation of "spaghetti code" and custom integrations as developers tried to connect LLMs to …
  continue reading
 
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play