The Peabody Award-winning On the Media podcast is your guide to examining how the media sausage is made. Hosts Brooke Gladstone and Micah Loewinger examine threats to free speech and government transparency, cast a skeptical eye on media coverage of the week’s big stories and unravel hidden political narratives in everything we read, watch and hear.
…
continue reading
Hacker History Podcast
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Hacker History: Explore where it all began, interviews with retro hackers, the pioneers and forefathers of yesteryear. The true old school hackers amongst our societies have an unquenchable thirst for knowledge. We will dive into fascinating stories that made hacker history.
…
continue reading
The best newspaper in Canada is a podcast. Original reporting, sharp political analysis, and media criticism you won’t get anywhere else. Keeping you informed about what’s happening now in your country. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
On Story of the Week, “journalist” Joel Stein chooses an article that fascinates him, convinces the writer to tell him about it, and then interrupts a good conversation by talking about himself. Sometimes the story will be the one everyone is talking about, like the New Yorker article on smoking hallucinogenic toads. Other times we’ll find a story you might have missed, like the one in the Verge about the rock groupie turned hacker who had huge corporations at her mercy. These are stories yo ...
…
continue reading
Based in New York City - JDP features diverse guests & topics including: Wild Stories, Current Events, Geopolitics, True Crime, Society & Culture, History, Tech, Investigative Journalism and much more. Hosted by Julian Dorey.
…
continue reading
Intellectually Curious is a podcast by Mike Breault featuring over 1,400 AI-powered explorations across science, mathematics, philosophy, and personal growth. Each short-form episode is generated, refined, and published with the help of large language models—turning curiosity into an ongoing audio encyclopedia. Designed for anyone who loves learning, it offers quick dives into everything from combinatorics and cryptography to systems thinking and psychology. Inspiration for this podcast: "Mu ...
…
continue reading
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
…
continue reading
Brought to you by the Texas National Security Review, this podcast features lectures, interviews, and panel discussions at The University of Texas at Austin.
…
continue reading
A podcast dedicated to the community that is building and using new digital tools for creation. We’re looking at the current palette of artmaking tools online, and taking a critical eye to the history of technology and the internet. We’re interested in where we’ve been and speculative ideas on the future.
…
continue reading
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
…
continue reading
Join Freedom Hacker, creator of The Truthiversity, and acclaimed author of 'The Grand Illusion' books as he cuts through the B.S. to get to the truth - whatever it may be. Brendan and his guests uncover the mysteries of consciousness, geopolitics, health, cosmology, medicine, freedom, personal development, exopolitics, the paranormal, and more. No dogmas. No holds barred. Nothing off limits. You'll need an open mind and your grown-up pants. Find out more about Brendan: https://brendandmurphy ...
…
continue reading
Welcome to my podcast ! I am Prishir Asha Shah : CYTOGRAPHER; ethical hacker ; coder and programmer bringing you about python and how it is used for all your needs . follow us on Spotify and give feedback regards from Prishir Asha Shah
…
continue reading
Who are these mysterious hackers that the world is afraid of? Have you ever wondered who they are and what they’ve done? Whether you're new to the world of cyber security, a seasoned engineer, or just someone that’s picked up enough to follow along, we’ve got a podcast for you. Hacking the Gibson is a podcast about the history of cyber security on the Internet. We’ve pulled together stories of the Information Superhighwaymen that have shaped the Internet. Some are heroes and heroines, some a ...
…
continue reading
UnTextbooked is brought to you by teen change-makers who are looking for answers to big questions. Have you ever wondered if protests really can save lives, why assimilation required Native American kids to attend boarding schools, how Black-led organizations for mutual aid began, how the fear of communism led the United States to plan the overthrows of many leaders in Latin America, or why Brazilian cars run on sugar? Or maybe you've questioned when Asian Americans will stop being seen as " ...
…
continue reading
A weekly podcast show about Indian startups, entrepreneurs, and more! Hosted by Neil Patel & Friends
…
continue reading
1
#365 - Dr. K on LIES of Western Med, 3rd Spirituality Layer & Org*sms | Healthy Gamer GG
3:25:40
3:25:40
Play later
Play later
Lists
Like
Liked
3:25:40SPONSORS: 1) RAG & BONE NEW YORK: Go to https://www.rag-bone.com/ and use code JULIAN for 20%! 2) AMENTARA: Go to https://www.amentara.com/go/julian and use code JD22 for 22% off your first order! PATREON https://www.patreon.com/JulianDorey ****TIMESTAMPS in description below**** - Alok M. Kanojia, also known as Dr. K., is an American psychiatrist …
…
continue reading
1
Is Carney Really Making Christianity a Hate Crime?
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53The politics of Canada’s proposed hate crime law, Bill C-9. In order to pass the Combatting Hate Act, the Liberals are teaming up with the Bloc Quebecois and removing the exemption for religious texts in existing hate speech laws. The Conservatives aren’t happy about it. But do we need to update our hate crime laws in the first place? Host: Jesse B…
…
continue reading
1
StarCloud-1: The Dawn of Orbital Data Centers
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17Join us as we unpack StarCloud-1, the first satellite to host an NVIDIA H100 in orbit and run a powerful LLM in space. We'll explain how orbital compute could slash energy use and cooling, scale to a proposed 5 GW data center powered by solar, and explore real-world applications—from wildfire detection to lifeboat spotting—in the race to redefine A…
…
continue reading
1
Hindsight Capsule: Grading 930 Hacker News Predictions with an LLM
5:24
5:24
Play later
Play later
Lists
Like
Liked
5:24We dissect Andrej Karpathy's project that uses a modern LLM to retrospectively judge the foresight in 930 December 2015 Hacker News discussions. From the six-section prompt to bias mitigation, learn how the system assigns A-to-F grades, spot standout predictions, and discuss what this approach implies for future knowledge synthesis and AI-driven fo…
…
continue reading
1
Menger's Theorem Unplugged: The Hidden Balance of Redundancy
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50In this deep dive, we unpack Menger's theorem—the elegant link between the minimum number of elements needed to disconnect two points and the maximum number of disjoint paths connecting them. We'll distinguish edge connectivity and vertex connectivity, explore how max-flow min-cut and linear programming underpin the same duality, and show how the t…
…
continue reading
1
Evolving AI: Inside Google's AlphaEvolve and the New Frontier of Algorithmic Meta-Learning
4:08
4:08
Play later
Play later
Lists
Like
Liked
4:08A deep dive into Google's AlphaEvolve, an AI-powered system that evolves optimization algorithms through seed code, mutation, and fitness-based selection. See how the Gemini-powered coding agent uses fast exploration and deep analysis to yield breakthroughs—recovering 0.7% of global compute by better scheduling, speeding a vital kernel by 23%, and …
…
continue reading
1
LHC Run 3 2025: Record-Breaking Data, Neon Nuclei, and the HL-LHC Era
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42In this deep-dive episode, we recount the final full year of the LHC's Run 3 (2025), where ATLAS and CMS hit a new milestone with 125 fb^-1 each and the four experiments together surpass 5×10^16 collisions in total. We explain the 150-pileup environment, 90%+ data-taking efficiency across ATLAS, CMS, LHCb, and ALICE (ALICE at 95% during a 21-day le…
…
continue reading
1
Ahshislesaurus wimani: The 109-Year Ghost in the Museum
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41A nine-ton hadrosaur from late Cretaceous Laramidia, found in New Mexico, spent over a century mislabelled in a museum. In 2025, a meticulous reanalysis by Dollman and colleagues reclassified it as Ahshislesaurus wimani. We unpack how a partial skull, a robust front mandible, and an extra set of teeth revealed a new genus—and how old bones in museu…
…
continue reading
1
Grok the stalker, the Louvre heist, and Microsoft 365 mayhem
55:38
55:38
Play later
Play later
Lists
Like
Liked
55:38On this week's show we learn that AI really can be a stalker’s best friend, as we explore a strange tale that starts with a manatee-shaped mailbox on a millionaire's lawn and ends with Grok happily doxxing real people, mapping out stalking "strategies," and handing out revenge-porn tips. Then we go inside the Louvre heist, where thieves in hi-vis a…
…
continue reading
1
How a Gossip Blogger (almost) Became the Poster Child for First Amendment Rights
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10Last summer, Perez Hilton, the gossip blogger who rose to fame for his scoopy and sometimes vicious takes in the early 2000s, was served a subpoena by Blake Lively's legal team. Perez Hilton decided to resist the subpoena under the argument that he is a journalist who is entitled to protect his sources. Micah speaks with Joel Simon, the longtime fo…
…
continue reading
In 2022, artist Hua Yong died while kayaking off the Sunshine Coast in BC. A former Chinese agent alleges it was a murder. Radio-Canada tells the story of how China continues to target dissidents living in Canada. Plus, India joins the battle for the Arctic and a new low for freelance writing rates. Host: Jesse Brown Credits: James Nicholson (Produ…
…
continue reading
1
Untangling Knots: The Unknotting Number and a 2025 Breakthrough
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38A friendly dive into knot theory and the unknotting number—the minimum number of crossing switches needed to untie a knot. We ride from simple knots like the trefoil and the figure-eight to complex families like twist and torus knots, explain why the unknotting number gives a deep glimpse into a knot's structure, and celebrate the 2025 result showi…
…
continue reading
1
Tit for Tat: How a Simple Rule Forges Cooperation
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38We unpack the iterated prisoner's dilemma, why 'tit for tat'—start cooperative and copy your opponent's last move—proved stunningly effective in Axelrod’s tournaments, and how generosity (GTFT) prevents spirals from miscommunication. From World War I trenches to AI diplomacy and business, we explore how a little forgiveness can stabilize complex sy…
…
continue reading
1
The Mersenne Twister: Engine of Modern Randomness
5:08
5:08
Play later
Play later
Lists
Like
Liked
5:08From the limits of early pseudorandom generators to the MT powerhouse, we unravel how Matsumoto and Nishimura engineered a long-lasting, high-quality RNG. Explore its astronomical period, 623-dimensional equidistribution, and the tempering polish that eliminates hidden patterns, plus why it’s become the backbone of Python, MATLAB, R, and Excel. We …
…
continue reading
1
Trade, Technology, & the US–Korea Alliance: A Conversation with Ambassador Kang
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33Sheena Chestnut Greitens sat down with Ambassador Kang Kyung-wha, the Republic of Korea's ambassador to the United States. Recorded before a live audience at The University of Texas at Austin on December 3, the conversation explores the deepening alignment between Seoul and Washington. Ambassador Kang and Dr. Greitens discuss the implementation of …
…
continue reading
1
#364 - Cult Victim EXPOSES Murderous Psychotic “Guru” & his Master Slave Fantasy | Sarah Edmondson
2:31:22
2:31:22
Play later
Play later
Lists
Like
Liked
2:31:22SPONSORS:1) GHOSTBED: During GhostBed’s Holiday Sale, you can get 25% off sitewide for a limited time. Just go to http://GhostBed.com/julian and use promo code JULIAN at checkout2) MIZZEN & MAIN: Right now, Mizzen & Main is offering our listeners 20% off your first purchase at http://mizzenandmain.com , promo code JULIAN203) BUBS NATURALS: Live Bet…
…
continue reading
1
Four Phases of Bumblebee Defense: The Choreography of Bombus terrestris
4:45
4:45
Play later
Play later
Lists
Like
Liked
4:45We unpack how Bombus terrestris nests mount a four-phase defense—from a rapid worker-led onset with alarm buzzing and leg-raising to a prolonged 'abdominal pumping' warm-up, followed by a delayed response with pulse buzzing and grooming. The colony's defense adapts to threat type, and a hidden layer—social immunity via transgenerational immune prim…
…
continue reading
1
Mars's Hidden Rivers: Hydrogen, Mega Basins, and the Quest for Ancient Life
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00Join us as we connect climate and chemistry models to Mars' faint young Sun paradox, where crustal hydrogen release and episodic volcanism could have produced bursts of warmth long enough for rivers to carve vast networks. A new map identifies 16 mega basins—each over 100,000 square kilometers—that cover only about 5% of the ancient terrain but con…
…
continue reading
1
MTBR: The Two-Step Memory That Transformed Cooperation in AI
4:43
4:43
Play later
Play later
Lists
Like
Liked
4:43We explore how memory-two bilateral reciprocity (MTBR) emerged from multi-agent Q-learning, revealing a dominant social strategy that combines forgiveness with a cycle-breaker. Learn about the dual objective—maximize your relative advantage to deter exploitation while also maximizing your own total payoff to encourage cooperation—and how these rule…
…
continue reading
1
Queen Mab and the Dust Engine: A Tiny Moon That Powers Uranus’ Rings
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22A humbling deep dive into MAB (formerly S2003-U1), the faint Uranian moon that evades easy measurement and even Voyager 2’s flyby. We trace its Hubble discovery in 2003, the mystery of its size, and how a chaotic, Goldilocks-sized moon acts as a self-sustaining dust factory that feeds Uranus’ ring system. This episode explores how a small world can…
…
continue reading
1
Tabernac to the Future: Referendum Likely Coming
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08As Premier François Legault plunges in the polls, he’s panic-legislating: turbo-charging secularism laws, unveiling a “made-in-Quebec” constitution, and reigniting old identity battles that haven’t burned this hot in decades. Then we head west, where B.C. Conservative leader John Rustad resigned after a spectacular caucus revolt. Sam asks him direc…
…
continue reading
1
Episode 229: Why Most Cybersecurity Advice Is Wrong
46:51
46:51
Play later
Play later
Lists
Like
Liked
46:51How do you stay safe online? (Wrong answers only.) Avoid public Wi-Fi, QR codes, charging stations. Cyber OG Bob Lord (Yahoo, DNC, CISA) wrote an open letter tackling the real harm caused by bad advice, and offering a better path with proven practices to stay safe online. Check out https://www.hacklore.org/letter Learn more about your ad choices. V…
…
continue reading
1
Cassiopeia A: The Ghost Supernova and the Cosmic Time Capsule
5:02
5:02
Play later
Play later
Lists
Like
Liked
5:02A deep-dive into Cassiopeia A, the brightest extra-solar radio source, and a centuries-old explosion that went unnoticed in the 1600s. We explore how radio, X-ray, and light-echo observations stitched together the event, revealing an asymmetric Type I explosion and the creation of life’s building blocks—like phosphorus. It’s a cosmic detective stor…
…
continue reading
1
The All-Brain Sea Urchin: A Juvenile Cell Atlas Rewrites Nervous System Design
4:25
4:25
Play later
Play later
Lists
Like
Liked
4:25In this deep dive, we explore the first detailed single-nucleus atlas of Paracentrotus lividus at two weeks old. SnRNA-seq maps every active gene in every cell and reveals a surprisingly complex nervous system: 48 cell clusters, 29 neuronal families, and a full suite of signaling—dopaminergic, serotonergic, cholinergic, GABAergic—distributed across…
…
continue reading
1
Kostensuchus atrox: Patagonia's Broad-Snout Apex Predator
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35We reveal a near-complete 70-million-year-old crocodile relative from Argentina—Kostensuchus atrox —and what its broad snout, giant jaw muscles, and serrated teeth tell us about Cretaceous land predation. The episode compares its ecology with coeval predators like Chaetotrox and Baryosuchids, explores locomotor clues from its limbs, and explains wh…
…
continue reading
The CBC is broken: how should it be fixed? Defund the whole thing? Refund the whole thing? Double down on digital? Stop chasing digital relevance? The list goes on and on. You've heard them all. But for a moment, forget about funding or even political bias. Just ask: why does the CBC exist? What is its underlying ideology? Not its political ideolo…
…
continue reading
Join us as we dive into blue holes—giant, oxygen-starved caverns carved from carbonate bedrock. We explore their Ice Age origins, the halocline that preserves climate records and fossils, and the unique chemosynthetic life that thrives there. We’ll also look at how scientists map these underwater time capsules and why they’re powerful analogs for l…
…
continue reading
1
The Hadamard Edge: Why Entrywise Multiplication Powers AI
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35We unpack the Hadamard (Schur) product: simple A ∘ B, equal-shaped matrices multiplied entrywise. It’s commutative and, crucially, why PSD matrices stay PSD thanks to the Schur product theorem—giving a stability guarantee for big systems. See how this tiny operation shows up in image masking, JPEG-like processing, and the gate-driven memory of LSTM…
…
continue reading
1
Stellar Populations: Reading the Galaxy’s Time Capsule
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55A deep dive into how astronomers map cosmic history with the ages and metals of stars. We trace Walter Baade’s Population I, II, and III framework, explain why metallicity acts as a cosmic clock, and show how Pop I (like the Sun) are metal-rich, Pop II are older and alpha-enhanced, and Pop III are the universe’s first stars. Explore how metal conte…
…
continue reading
1
Chewbacca Coral: The Shaggy Giant of the Deep Sea
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Dive into the discovery of Iridogorgia chewbacca, a shimmering deep-sea bamboo coral whose thousands of active polyps cloak its stalk in a fuzzy, iridescent halo. We unpack what a monopodial spiral axis means, how this species survives at 400–1,000 meters in the western Pacific, and why archival ROV footage led scientists to formally describe it as…
…
continue reading
1
Frobenius Normal Form: The Unique Fingerprint of Matrix Similarity
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Dive into the Frobenius (Rational) Canonical Form and discover how it gives each square matrix a unique fingerprint that survives changes of basis. We’ll see why this form avoids eigenvalue factoring, using invariant factors and companion blocks to build a canonical block-diagonal picture. Compare it with diagonalization and Jordan form, and learn …
…
continue reading
A deep dive into Mount Zao’s awe-inspiring juhyo—giant, feathery ice formations sculpted by the perfect storm of geography, biology, and brutal weather. We break down ice-snow accretion, the role of the hardy Maris fir, and how supercooled droplets and wind angle create the feathered, low-density “soft rime” that gives these giants their surreal sh…
…
continue reading
1
Covering the Pentagon, from Sy Hersh to Laura Loomer
1:03:43
1:03:43
Play later
Play later
Lists
Like
Liked
1:03:43The New York Times has sued the Pentagon for restricting access to journalists. On this week’s On the Media, meet the new cast of right wing influencers and conspiracy theorists replacing the press corps in the Pentagon. Plus, a new documentary examines the life and work of investigative journalist Seymour Hersh. [01:00] Host Micah Loewinger sits d…
…
continue reading
1
#363 - Tyler Oliveira goes NUCLEAR on Secrets of the Elites, Epstein Files & Mass Immigration
3:13:02
3:13:02
Play later
Play later
Lists
Like
Liked
3:13:02SPONSORS: 1) AMENTARA: Go to https://www.amentara.com/go/julian and use code JD22 for 22% off your first order! 2) MOOD: Discover your perfect mood and get 20% off your first order at http://mood.com and use code JULIAN at check out! 3) HOLLOW SOCKS: For a limited time Hollow Socks is having a Buy 2, Get 2 Free Sale. Head to http://Hollowsocks.com …
…
continue reading
A tour of the darkest materials, from nanotube forests like Vantablack to nanofibril fabrics and melanin-based layers inspired by deep-sea organisms. We explore how nanoscale structures trap nearly all light, why durability and scalability matter, and how nature’s blueprints could power robust ultra-black coatings for science, industry, and everyda…
…
continue reading
1
Newcomb’s Paradox in the Age of AI: One Box, Two Boxes, and Free Will
4:23
4:23
Play later
Play later
Lists
Like
Liked
4:23We unpack the classic predictor dilemma—two boxes, a near-perfect forecaster, and a choice that seems to predefine your fate. We compare the one-box and two-box strategies, dive into the idea of character formation, and discuss what ultra-accurate predictions mean for decision-making in an AI-enabled world. Note: This podcast was AI-generated, and …
…
continue reading
1
Prompt Architecture: Mastering Strategic AI Prompting
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19A practical deep-dive into turning AI prompts into repeatable, high-impact results. We unpack four input types (simple questions, tasks, entity/classification prompts, and completions), the value of few-shot examples, and the power of positive guardrails. Learn how to shape context, use explicit structure with delimiters, and tune creativity with t…
…
continue reading
1
How to Break Into Journalism: an AI Scam Story
32:26
32:26
Play later
Play later
Lists
Like
Liked
32:26A story in The Local reveals how AI writing is infiltrating newsrooms, flooding inboxes, and snagging bylines in major outlets. Is the rise of the AI journalist inevitable or is it already here? Jay Caspian Kang of the New Yorker joins to consider if a chatbot could write his column. This episode uses generative AI for the following purposes: Episo…
…
continue reading
1
#362 - Area 52 on Bob Lazar, David Grusch, DARPA & Underwater Anomalies | Chris Ramsay
1:11:24
1:11:24
Play later
Play later
Lists
Like
Liked
1:11:24PATREON: https://www.patreon.com/JulianDorey WATCH CHRIS RAMSAY PART 1: https://open.spotify.com/episode/3fX5eeQrF3Nu8j9G3Ncszu?si=_eXiGHTdRbK7svHA_zpsMA (***TIMESTAMPS in description below) ~ Chris Ramsay is a world-renowned magician, UFO researcher & YouTuber. His second YouTube channel "Area52" is dedicated to investigations of UAP phenomena and…
…
continue reading
1
The Codex Unfolded: Anatomy, History, and Craft of the Book
4:17
4:17
Play later
Play later
Lists
Like
Liked
4:17A voyage from Roman wax tablets to the codex, exploring its binding, text block, endpapers, paste-downs, fly leaves, and the art of bookmaking—from accordion folds to ebru paper marbling—celebrating the craftsmanship behind the everyday book. Note: This podcast was AI-generated, and sometimes AI can make mistakes. Please double-check any critical i…
…
continue reading
1
Radio Armor: Detecting a Magnetic Shield on YZ Ceti b
5:21
5:21
Play later
Play later
Lists
Like
Liked
5:21Scientists using the VLA detected strongly polarized, repeating radio bursts synchronized with the 2-day orbit of rocky YZ Ceti b, revealing a planetary magnetic field via star-planet interactions. This first direct hint of a magnetosphere around a terrestrial exoplanet 12 light-years away offers a powerful tool to assess atmospheric retention and …
…
continue reading
1
SBOA: The Secretary Bird’s Blueprint for Edge AI and Drone Scheduling
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37A nature-inspired deep dive into the Secretary Bird Optimization Algorithm (SBOA): how a raptor’s two-stage hunt—general search with Brownian motion and precision strikes via Levy flights—translates into robust, dynamic scheduling for edge-enabled drone networks. We explore enhancements like MSESBOA+RL, golden sinusoidal guidance, and cooperative c…
…
continue reading
Every year for the past 11 or so years, Canadaland has run a crowdfunding campaign in the fall. We finished up this year’s campaign in late November, and so we wanted to hear from you, about what we should do with all of your hard earned money. After all, Jesse Brown has said that “We work for you.” You filled up the lines for two hours and let Sam…
…
continue reading
1
The Art Gallery Problem: Why floor(n/3) Guards Are Enough
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Join us as we dissect the art gallery problem for simple polygons: triangulate the shape, color the vertices with three colors, and pick guards from the smallest color class to cover every spot. We trace the logic from the floor(n/3) bound to efficient algorithms like Jarvis's march and Chan's O(n log H), and explore trapezoidal maps and randomized…
…
continue reading
1
A hacker doxxes himself, and social engineering-as-a-service
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32A teenage cybercriminal posts a smug screenshot to mock a sextortion scammer... and accidentally hands over the keys to his real-world identity. Meanwhile, we look into the crystal ball for 2026 and consider how stolen data is now the jet fuel of cybercrime – and how next year could be even nastier than 2025. Plus, Graham rants about recipe sites t…
…
continue reading
Late last month, Reuters reported that DOGE had “disbanded,” that the group was no longer a centralized government entity. But according to Wired Reporter Vittoria Elliott, while DOGE is no longer moving across the government "in a move-fast-and-break-things blitz,” it is far from dead and gone. One source, at the USDA, told Wired that DOGE operati…
…
continue reading
1
Canada's in a Cold War with America, but America Hasn't Noticed
33:23
33:23
Play later
Play later
Lists
Like
Liked
33:23It’s been one year since Trump started threatening Canada’s economy and our sovereignty. But with all this story’s twists and turns, have Canadians grown complacent about what’s at stake? Producer James Nicholson steps into the host’s chair to make a bold case that Canada isn’t just in a tariff war. We’re in a cold war. And we need to start acting …
…
continue reading
1
Mamenchisaurus: The 41% Neck and the Engineering of Gigantism
4:39
4:39
Play later
Play later
Lists
Like
Liked
4:39We dive into the biology of Mamenchisaurus youngii, whose neck accounted for about 41% of its body length. Learn how pneumatic bones filled with air pockets lightened the mass to roughly 0.5 g/cm^3, how overlapping ossified tendons acted as tension cables to stiffen a long neck, and how an avian-style respiratory system kept the animal breathing ef…
…
continue reading
1
Reverse Mathematics: The Foundational Price of Theorems
4:39
4:39
Play later
Play later
Lists
Like
Liked
4:39What if the truth of a theorem reveals the exact axioms needed to prove it? In this episode we explore reverse mathematics, a program that starts from a theorem and asks: what is the minimal axiom system required in second-order arithmetic? We'll meet RCA0 as the computable baseline, see how many theorems align with WKL0, ACA0, ATR0, or Pi11-CA0, a…
…
continue reading
1
108 Sun Salutations: The Yoga Mala and the Art of Transformation
5:12
5:12
Play later
Play later
Lists
Like
Liked
5:12Join us as we explore the yoga mala—108 Surya Namaskar sequences designed to purify, build tapas, and reset the mind. We break down the symbolism of 108, the breath-movement synchronization, and how to maintain precision with safe modifications. From the mental wall around rep 70 to the restorative savasana that closes the practice, learn practical…
…
continue reading