Technical interviews about software topics.
…
continue reading
Software Engineering Daily Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Technical interviews about software topics.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
We live in a world where our civilization and daily lives depend upon institutions, infrastructure, and technological substrates that are _complicated_ but not _unknowable_. Join Patrick McKenzie (patio11) as he discusses how decisions, technology, culture, and incentives shape our finance, technology, government, and more, with the people who built (and build) those Complex Systems.
…
continue reading
Is bringing up your software engineering salary a dating red flag? How do you strike a balance between career ambition and incendiary burnout? Is it ever okay to hold your code hostage in escrow? Navigating a career in tech raises a lot of tricky questions that aren’t exactly appropriate for the daily stand-up. So let’s take this off the VPN. In this new podcast from Jellyfish, work besties Jasmine and Allison scour the internet to find the real questions engineers and developers are whisper ...
…
continue reading
Stories of people hacking on weird and interesting projects.
…
continue reading
Built This Week is a weekly podcast where real builders share what they're shipping, the AI tools they're trying, and the tech news that actually matters. Hosted by Sam and Jordan from Ryz Labs, the show offers a raw, inside look at building products in the AI era—no fluff, no performative hype, just honest takes and practical insights from the front lines.
…
continue reading

1
Open Source Archives - Software Engineering Daily
Open Source Archives - Software Engineering Daily
Open source technology episodes of Software Engineering Daily
…
continue reading
From a daily newsletter comes a (almost daily) podcast from the kind of lawyer you never knew existed and never knew you needed. Law for software engineers - intellectual property - employment issues - side projects - open source - privacy - that creepy lurker on Slack - so much to discuss
…
continue reading
What does it take to be a great leader? We asked some of the most influential names in software engineering and product management. You’ll learn ways to grow as a software engineering leader, optimize your time, develop your team, structure your organization, and get the right products to market, faster. In each episode, Joshua Samberg and Robin Pokorný uncover the empowering insights and daily habits of industry leaders who think, speak, and act in ways that make a positive difference in th ...
…
continue reading

1
Machine Learning Archives - Software Engineering Daily
Machine Learning Archives - Software Engineering Daily
Machine learning and data science episodes of Software Engineering Daily.
…
continue reading
Databases and data engineering episodes of Software Engineering Daily
…
continue reading
Few careers have the kind of daily worldwide impact as software engineering. It shapes the interactions that billions of people have online across so many moments of their days. So, how do software engineers keep ahead of the world's increasing reliance on IT solutions? Welcome to SEEK Bytes, a podcast for software engineers, by software engineers who work at SEEK, an Australian-founded leader in online employment marketplaces. Each fortnight, our team of hosts and guests will explore intern ...
…
continue reading
A podcast that recaps some of the top posts on Hacker News every day. This is a third-party project, independent from HN and YC. Text and audio generated using AI, by Wondercraft.ai. Create your own news rundown podcast at app.wondercraft.ai
…
continue reading
Beyond Coding is a weekly podcast with conversations that go "beyond coding" in a fireside chat format. Common topics are tech, entrepreneurship, and career journeys. Authentic, informative and inspiring. That's the aim for each episode. New episodes every Wednesday 🎙
…
continue reading
How does modern day Korea compare to America? Join co-hosts Daniel and Jun every week as they explore a topic and discuss it from both the American and Korean perspective. If you're looking to learn more about Korean society and culture, are a part of the Korean diaspora and curious how Korea has changed since you, your parents, or your grandparents left, or are simply interested in broadening your personal worldview and perspective, then we hope you'll listen in and join us on this journey! ...
…
continue reading
A Software Engineering graduate, Kar Yung Tom is a games enthusiast with high-level tournament experience in chess, Magic: The Gathering, poker and daily fantasy sports. In this show, KYT interviews personalities from the gaming world with a focus on up-and-coming Canadian talent in the world of MTG.
…
continue reading
Business, philosophy, and culture episodes of SE Daily
…
continue reading
Welcome to the SEO.co Daily Search Engine Optimization Podcast. Bringing you daily SEO & digital marketing tips that we've learned throughout our 20+ years of internet marketing. Learn the latest SEO, content marketing, link building, social marketing, conversion optimization, persuasive selling & internet marketing tactics that work today. Learn more at SEO.co.
…
continue reading
The Select* Podcast features guests across a wide range of backgrounds & topics, with the goal of being your resource for software engineering, leadership advice, edge computing, machine learning, inclusion, tech trends, data management, career paths, enterprise tech, & much, much more. The Select* Podcast is also known as the Select Star Podcast or the HarperDB Podcast. If you listen to podcasts like Syntax, Founder Stories, Changelog, CodeNewbie, TechStuff, Stack Overflow, Software Enginee ...
…
continue reading
A peak behind the scenes on the journey of amazing human beings that have blazed their own trails. You hear about the trials and tribulations in the journey. The interview explores the mental models and processes these trailblazers use daily. In other words, how do they think? How do they deal with fear + doubt? What are the things they do or think about on a daily basis that lead to positive results over time. You will have an insight into their mindset, habits, routines and books that have ...
…
continue reading
A daily show focused on motivation, productivity, leadership, technology, communication, entrepreneurship and work/life balance. This show aired 2016-2017.
…
continue reading
A weekly 30-minute podcast focused on the business of fashion. Fashion Rewired is about the successful transformation of your mind, perspective, and daily approach to your fashion brand. During the Fashion Rewired Podcast, we chat with successful fashion designers and business entrepreneurs who share their powerful stories of success. While providing real time industry tips, tools, and actionable strategies to execute today. With the goal of DESIGNING our listener’s brands for success! YOUR ...
…
continue reading
Tell Me About Your Job is a podcast that dives into the jobs and careers of all kinds of normal people, the work they do every single day! We want to inform our listeners about different work fields and careers that are available to them, whether they’re high-schoolers, college students, or adults looking to change careers. We accomplish that by interviewing industry professionals about the work they do on a daily basis, and what it really looks like to have a job in their field. We hope thi ...
…
continue reading
The mission of Back to Back SWE is to empower the software engineer to excel in the interview and land the job of their dreams. If you are a high school student, college student, new-grad, industry professional, or...anything in the tech industry...then this podcast is for you. If you want to find the best work in technology while cutting through the bs, you are in the right place. Come visit us at https://backtobackswe.com
…
continue reading

1
Complex Workload Deployment with Will Stewart
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Deploying and managing cloud workloads is a complex task that requires developers to handle infrastructure, scaling, CI/CD pipelines, and database hosting. Configuring and maintaining Kubernetes, ensuring smooth deployments, and integrating various services efficiently is a common challenge. Will Stewart is the co-founder and CEO of Northflank, whi…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
…
continue reading

1
Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
…
continue reading

1
Beyond the smoke screen. [Research Saturday]
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
…
continue reading
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number …
…
continue reading
Episode 9: Hiring Tools, Built from Scratch This week, Jordan Metzner and Sam Nadler unveil Ryz ATS, a fully functioning applicant tracking system built in-house using Claude AI. From job templates and smart matching to drag-and-drop pipelines and sourcing CRM, this tool streamlines the entire hiring process with AI as a co-pilot. Then, they explor…
…
continue reading

1
Second Order Consequences and Forcing Functions
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45Todays episode delves into understanding and leveraging second and third-order consequences – the ripple effects that occur after an initial action – and introduces forcing functions, which are an inverted way of thinking about these consequences, designed to drive desired outcomes by first determining "what must be true" for them to occur. The epi…
…
continue reading

1
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
…
continue reading
Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks…
…
continue reading

1
Complex Workload Deployment with Will Stewart
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Deploying and managing cloud workloads is a complex task that requires developers to handle infrastructure, scaling, CI/CD pipelines, and database hosting. Configuring and maintaining Kubernetes, ensuring smooth deployments, and integrating various services efficiently is a common challenge. Will Stewart is the co-founder and CEO of Northflank, whi…
…
continue reading

1
Complex Workload Deployment with Will Stewart
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33Deploying and managing cloud workloads is a complex task that requires developers to handle infrastructure, scaling, CI/CD pipelines, and database hosting. Configuring and maintaining Kubernetes, ensuring smooth deployments, and integrating various services efficiently is a common challenge. Will Stewart is the co-founder and CEO of Northflank, whi…
…
continue reading

1
AI and the great developer speed-up, with Joel Becker of METR
1:05:51
1:05:51
Play later
Play later
Lists
Like
Liked
1:05:51This week on Complex Systems, Patrick McKenzie (patio11) is joined by Joel Becker from METR. They discuss groundbreaking research on AI coding assistants. Joel et al’s randomized controlled trial of 16 expert developers working on major open source projects revealed a counterintuitive finding: despite predictions of 24-40% speed improvements, devel…
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
…
continue reading
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePo…
…
continue reading

1
The Simple Daily Habit That Unlocks Your Productivity
44:42
44:42
Play later
Play later
Lists
Like
Liked
44:42Time is your most finite resource; once you spend it, you can never get it back. In this conversation, co-founder and Senior Product Manager Joseph Hill reveals the mindset and systems he uses to be intentional with his time, manage his focus, and stay productive without burning out. In this episode, we cover: How to be intentional with your time a…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading
A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand tha…
…
continue reading

1
Empowering Cross-Functional Product Teams with Tobias Dunn-Krahn and Doug Peete
46:28
46:28
Play later
Play later
Lists
Like
Liked
46:28Modern software teams typically rely on a patchwork of tools to manage planning, development, feature rollout, and post-release analysis. This fragmentation is a known challenge that can create friction and slow down software development iteration. It’s especially problematic for cross-functional teams, where differences in roles, expertise, and wo…
…
continue reading

1
Empowering Cross-Functional Product Teams with Tobias Dunn-Krahn and Doug Peete
46:28
46:28
Play later
Play later
Lists
Like
Liked
46:28Modern software teams typically rely on a patchwork of tools to manage planning, development, feature rollout, and post-release analysis. This fragmentation is a known challenge that can create friction and slow down software development iteration. It’s especially problematic for cross-functional teams, where differences in roles, expertise, and wo…
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
…
continue reading
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s sy…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
…
continue reading

1
Don't Try to Solve Hyperobject Problems Once
15:46
15:46
Play later
Play later
Lists
Like
Liked
15:46This episode delves into the philosophical concept of hyperobjects – problems so vast and complex they lack clear boundaries and cannot be "solved" once and for all. It explores why attempting to permanently fix issues like technical debt, user experience, or performance management is often ineffective. Instead, it offers a new perspective: how to …
…
continue reading

1
Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50Please enjoy this encore of Career Notes. Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pa…
…
continue reading

1
The CVE countdown clock. [Research Saturday]
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were…
…
continue reading
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement…
…
continue reading
Episode 8: Can Public Make You a Better Investor? This week, Jordan Metzner and Sam Nadler go deep on Public.com, the modern investing platform opening its trading infrastructure to developers. They demo a new tool built live on Public’s API, explore the real potential of programmable investing, and sit down with Emily Kurtz (Head of Product at Pub…
…
continue reading

1
SANS Stormcast Friday, August 15th, 2025: Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
…
continue reading
A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform. Phishing attacks increasingly rely o…
…
continue reading

1
Carbon and Modernizing C++ with Chandler Carruth
1:02:39
1:02:39
Play later
Play later
Lists
Like
Liked
1:02:39Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It’s designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
…
continue reading

1
Carbon and Modernizing C++ with Chandler Carruth
1:02:39
1:02:39
Play later
Play later
Lists
Like
Liked
1:02:39Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It’s designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
…
continue reading

1
Carbon and Modernizing C++ with Chandler Carruth
1:03:37
1:03:37
Play later
Play later
Lists
Like
Liked
1:03:37Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It's designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
…
continue reading
In this solo episode, Patrick McKenzie reads his classic essay "Seeing Like a Bank," exploring why financial institutions often appear to have no memory of previous customer interactions despite being excellent at tracking money itself. He breaks down the complex web of legacy systems, tiered support structures, and regulatory constraints that crea…
…
continue reading

1
SANS Stormcast Thursday, August 14th, 2025: Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
…
continue reading
Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors. Researchers uncover a malware campaign hiding the NjRat Remote Access Troj…
…
continue reading
What happens when our most senior engineer stops writing code altogether and lets AI handle everything? Well, you can expect projects and productivity to go out the window. Meet Simon, who is about 30+ years into the game and fully convinced that AI will fully replace the developer. From trying to build a model that could replace the whole team, to…
…
continue reading

1
Principal Software Engineer: Democracy at Work is Overrated
1:04:06
1:04:06
Play later
Play later
Lists
Like
Liked
1:04:06Dario Gieselaar, Principal Software Engineer from Elastic gets brutally honest about what it really takes to succeed in a top tech company. We uncover the uncomfortable truths about the promotion game, why direct feedback is crucial (even when it hurts), and why a "winning" mindset is everything. This is the conversation about career growth they do…
…
continue reading

1
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
…
continue reading
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberatta…
…
continue reading
Podman is an open-source container management tool that allows developers to build, run, and manage containers. Unlike Docker, it supports rootless containers for improved security and is fully compatible with standards from the Open Container Initiative, or OCI. Brent Baude is a Senior Principal Software Engineer at Red Hat where he works on Podma…
…
continue reading
Podman is an open-source container management tool that allows developers to build, run, and manage containers. Unlike Docker, it supports rootless containers for improved security and is fully compatible with standards from the Open Container Initiative, or OCI. Brent Baude is a Senior Principal Software Engineer at Red Hat where he works on Podma…
…
continue reading