Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Software Engineering Daily Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Developer Tea

Jonathan Cutrell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
  continue reading
 
What does it take to be a great leader? We asked some of the most influential names in software engineering and product management. You’ll learn ways to grow as a software engineering leader, optimize your time, develop your team, structure your organization, and get the right products to market, faster. In each episode, Joshua Samberg and Robin Pokorný uncover the empowering insights and daily habits of industry leaders who think, speak, and act in ways that make a positive difference in th ...
  continue reading
 
Artwork
 
Is bringing up your software engineering salary a dating red flag? How do you strike a balance between career ambition and incendiary burnout? Is it ever okay to hold your code hostage in escrow? Navigating a career in tech raises a lot of tricky questions that aren’t exactly appropriate for the daily stand-up. So let’s take this off the VPN. In this new podcast from Jellyfish, work besties Jasmine and Allison scour the internet to find the real questions engineers and developers are whisper ...
  continue reading
 
Few careers have the kind of daily worldwide impact as software engineering. It shapes the interactions that billions of people have online across so many moments of their days. So, how do software engineers keep ahead of the world's increasing reliance on IT solutions? Welcome to SEEK Bytes, a podcast for software engineers, by software engineers who work at SEEK, an Australian-founded leader in online employment marketplaces. Each fortnight, our team of hosts and guests will explore intern ...
  continue reading
 
Artwork

1
Raising Health

Andreessen Horowitz, a16z Bio + Health

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A myriad of AI, science, and technology experts explore the real challenges and enormous opportunities facing entrepreneurs who are building the future of health. Raising Health, a podcast by a16z Bio + Health and hosted by Kris Tatiossian and Olivia Webb, dives deep into the heart of biotechnology and healthcare innovation. Join veteran company builders, operators, and investors Vijay Pande, Julie Yoo, Vineeta Agarwala, and Jorge Conde, along with distinguished guests like Mark Cuban, Greg ...
  continue reading
 
Artwork

1
Hacker News Recap

Wondercraft.ai

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
A podcast that recaps some of the top posts on Hacker News every day. This is a third-party project, independent from HN and YC. Text and audio generated using AI, by Wondercraft.ai. Create your own news rundown podcast at app.wondercraft.ai
  continue reading
 
How does modern day Korea compare to America? Join co-hosts Daniel and Jun every week as they explore a topic and discuss it from both the American and Korean perspective. If you're looking to learn more about Korean society and culture, are a part of the Korean diaspora and curious how Korea has changed since you, your parents, or your grandparents left, or are simply interested in broadening your personal worldview and perspective, then we hope you'll listen in and join us on this journey! ...
  continue reading
 
Artwork

1
The KYT Show

Kar Yung Tom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A Software Engineering graduate, Kar Yung Tom is a games enthusiast with high-level tournament experience in chess, Magic: The Gathering, poker and daily fantasy sports. In this show, KYT interviews personalities from the gaming world with a focus on up-and-coming Canadian talent in the world of MTG.
  continue reading
 
Welcome to the SEO.co Daily Search Engine Optimization Podcast. Bringing you daily SEO & digital marketing tips that we've learned throughout our 20+ years of internet marketing. Learn the latest SEO, content marketing, link building, social marketing, conversion optimization, persuasive selling & internet marketing tactics that work today. Learn more at SEO.co.
  continue reading
 
The Twenty Minute VC (20VC) interviews the world's greatest venture capitalists with prior guests including Sequoia's Doug Leone and Benchmark's Bill Gurley. Once per week, 20VC Host, Harry Stebbings is also joined by one of the great founders of our time with prior founder episodes from Spotify's Daniel Ek, Linkedin's Reid Hoffman, and Snowflake's Frank Slootman. If you would like to see more of The Twenty Minute VC (20VC), head to www.20vc.com for more information on the podcast, show note ...
  continue reading
 
The Select* Podcast features guests across a wide range of backgrounds & topics, with the goal of being your resource for software engineering, leadership advice, edge computing, machine learning, inclusion, tech trends, data management, career paths, enterprise tech, & much, much more. The Select* Podcast is also known as the Select Star Podcast or the HarperDB Podcast. If you listen to podcasts like Syntax, Founder Stories, Changelog, CodeNewbie, TechStuff, Stack Overflow, Software Enginee ...
  continue reading
 
Artwork

1
Trailblazer Show

Trailblazer Show

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A peak behind the scenes on the journey of amazing human beings that have blazed their own trails. You hear about the trials and tribulations in the journey. The interview explores the mental models and processes these trailblazers use daily. In other words, how do they think? How do they deal with fear + doubt? What are the things they do or think about on a daily basis that lead to positive results over time. You will have an insight into their mindset, habits, routines and books that have ...
  continue reading
 
Artwork
 
Tell Me About Your Job is a podcast that dives into the jobs and careers of all kinds of normal people, the work they do every single day! We want to inform our listeners about different work fields and careers that are available to them, whether they’re high-schoolers, college students, or adults looking to change careers. We accomplish that by interviewing industry professionals about the work they do on a daily basis, and what it really looks like to have a job in their field. We hope thi ...
  continue reading
 
Artwork
 
The mission of Back to Back SWE is to empower the software engineer to excel in the interview and land the job of their dreams. If you are a high school student, college student, new-grad, industry professional, or...anything in the tech industry...then this podcast is for you. If you want to find the best work in technology while cutting through the bs, you are in the right place. Come visit us at https://backtobackswe.com
  continue reading
 
A weekly 30-minute podcast focused on the business of fashion. Fashion Rewired is about the successful transformation of your mind, perspective, and daily approach to your fashion brand. During the Fashion Rewired Podcast, we chat with successful fashion designers and business entrepreneurs who share their powerful stories of success. While providing real time industry tips, tools, and actionable strategies to execute today. With the goal of DESIGNING our listener’s brands for success! YOUR ...
  continue reading
 
Loading …
show series
 
Illia Polosukhin is a veteran AI researcher and one of the original authors of the landmark Transformer paper, Attention is All You Need, which he co-authored during his time at Google Research. He has a deep background in machine learning and natural language processing, and has spent over a decade working at the intersection of AI and decentraliz…
  continue reading
 
Meta Platforms is unlikely to alter its “pay-or-consent” model further, which could lead to new EU antitrust charges, Goldman Sachs is integrating an autonomous AI software engineer named Devin, and a new study found that using AI coding assistants actually slowed down developers by 19%. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. …
  continue reading
 
Meta Platforms is unlikely to alter its "pay-or-consent" model further, which could lead to new EU antitrust charges, Goldman Sachs is integrating an autonomous AI software engineer named Devin, and a new study found that using AI coding assistants actually slowed down developers by 19%. Link to Show Notes Support this show http://supporter.acast.c…
  continue reading
 
Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU’s new voluntary AI code of practice. A new report claims last yea…
  continue reading
 
UK to drop plan to force Apple to create a backdoor into encrypted iCloud data? T-Mobile starts rolling out L4S, WhatsApp replaces its native Windows app with web-based wrapper version. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what y…
  continue reading
 
UK to drop plan to force Apple to create a backdoor into encrypted iCloud data? T-Mobile starts rolling out L4S, WhatsApp replaces its native Windows app with web-based wrapper version. Show Notes Support this show http://supporter.acast.com/dth. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
Edwin Chen is the Founder and CEO of Surge. Founded in 2020, Surge has scaled to $1BN+ in revenue with zero external funding. At the same time, their competitor, Scale.ai raised over $1.3BN to reach $850M ARR. Today, Surge have the world’s largest model providers as customers and have just 120 employees. Agenda: 00:00 — “Everyone Else Is Just a Bod…
  continue reading
 
Hewlett Packard warns of hardcoded passwords in Aruba access points SharePoint zero-day exploited via RCE, no patch available Russian vodka producer suffers ransomware attack Huge thanks to our sponsor, Nudge Security Discover every SaaS account ever created by anyone in your org within minutes of starting a free trial. Harden configs, enforce MFA,…
  continue reading
 
SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
  continue reading
 
Please enjoy this encore of Career Notes: Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. S…
  continue reading
 
This week, we are pleased to be joined by ⁠George Glass⁠, Associate Managing Director of ⁠Kroll⁠'s Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Cyrus Tibbs, CISO, PennyMac Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatL…
  continue reading
 
The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentica…
  continue reading
 
Congress passed the GENIUS Act, the first legislation to regulate cryptocurrency, a Russian lawmaker warned WhatsApp to prepare for its departure from the Russian market, and Netflix is using AI in film and show production. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this …
  continue reading
 
Congress passed the GENIUS Act, the first legislation to regulate cryptocurrency, a Russian lawmaker warned WhatsApp to prepare for its departure from the Russian market, and Netflix is using AI in film and show production. Link to Show Notes Support this show http://supporter.acast.com/dth. Hosted on Acast. See acast.com/privacy for more informati…
  continue reading
 
Scott Wu is the co-founder and CEO of Cognition, the company behind Devin, the world’s first AI software engineer. On Friday last week they pulled off the acquisition of the year, acquiring Windsurf, following their licensing agreement with Google. Previously a world-class competitive programmer, he was a gold medalist at the International Olympiad…
  continue reading
 
Chinese hackers use Cobalt Strike on Taiwan’s semiconductor sector Salt Typhoon breaches National Guard and steals network configurations Congress considers Stuxnet to manage OT threats Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses fro…
  continue reading
 
Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
  continue reading
 
Pro-Russian Hackers, scam lords, and ransomware gangs face global justice. Louis Vuitton ties customer data breaches to a single cyber incident. The White House is developing a “Zero Trust 2.0” cybersecurity strategy. OVERSTEP malware targets outdated SonicWall Secure Mobile Access (SMA) devices. An Australian political party suffers a massive rans…
  continue reading
 
Scale AI lays off 14% of its workforce, Jack Dorsey invests $10 million to fund experimental open-source projects, and Substack secures $100 million in funding at a $1.1 billion valuation. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy wha…
  continue reading
 
Scale AI lays off 14% of its workforce, Jack Dorsey invests $10 million to fund experimental open-source projects, and Substack secures $100 million in funding at a $1.1 billion valuation. Link to Show Notes Support this show http://supporter.acast.com/dth. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
Illia Polosukhin is a veteran AI researcher and one of the original authors of the landmark Transformer paper, Attention is All You Need, which he co-authored during his time at Google Research. He has a deep background in machine learning and natural language processing, and has spent over a decade working at the intersection of AI and decentraliz…
  continue reading
 
Illia Polosukhin is a veteran AI researcher and one of the original authors of the landmark Transformer paper, Attention is All You Need, which he co-authored during his time at Google Research. He has a deep background in machine learning and natural language processing, and has spent over a decade working at the intersection of AI and decentraliz…
  continue reading
 
Agenda: 00:00 Windsurf was dead—then this deal changed everything 05:00 The Windsurf x Google x Cognition saga explained 09:00 The OpenAI deal collapsed—what really happened 15:00 FTC rules forced a brutal deal structure—who lost? 17:00 The investors’ returns: who actually made money? 21:30 Will Google’s corp dev team get fired over this? 23:00 Cog…
  continue reading
 
Google says ‘Big Sleep’ AI tool found bug hackers planned to use Google fixes actively exploited sandbox escape zero day in Chrome China’s cyber sector amplifies Beijing’s hacking of U.S. targets Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect busi…
  continue reading
 
This episode focuses again on the fundamental principle that your systems are perfectly designed for the outcomes you are experiencing, regardless of whether those systems were intentionally or accidentally created. Here are the key takeaways from the episode: Uncover how your systems, whether intentionally or accidentally designed, are perfectly c…
  continue reading
 
More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
  continue reading
 
Google and Microsoft issue critical updates. CISA warns of active exploitation of a critical flaw in Wing FTP Server. Cloudflare restores their DNS Resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they’ve disrupted Chinese …
  continue reading
 
Chinese cyberattacks against the US on the rise, Seagate’s HAMR-based hard drives now available to consumers, Google claims “Big Sleep” actively blocked a zero-day attack in the wild. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what you…
  continue reading
 
A date so bad, it felt like a work meeting? Yeah, that happened. Meet Rochelle, who thought she was going on a quirky first date with a software engineer - until an 8-minute voice memo, an unhinged rant about remote work, and a very questionable boss threat turned everything upside down. If you’ve ever tried to date in tech and found yourself knee-…
  continue reading
 
Pentagon welcomes Chinese engineers into its environment HazyBeacon: It’s not a beer, but it leaves a bitter aftertaste What the world needs now is another framework Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks a…
  continue reading
 
Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
  continue reading
 
A DOGE employee leaks private API keys to GitHub. North Korea’s “Contagious Interview” campaign has a new malware loader. A New Jersey diagnostic lab suffers a ransomware attack. A top-grossing dark web marketplace goes dark in what experts believe is an exit scam. MITRE launches a cybersecurity framework to address threats in cryptocurrency and di…
  continue reading
 
NotebookLM, is introducing “featured notebooks” from various sources, Microsoft utilizes engineers in China to maintain Defense Department computer systems, and the DOD intends to allocate $1 billion over the next four years to “offensive cyber operations.” MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our sup…
  continue reading
 
NotebookLM, is introducing "featured notebooks" from various sources, Microsoft utilizes engineers in China to maintain Defense Department computer systems, and the DOD intends to allocate $1 billion over the next four years to "offensive cyber operations." Link to Show Notes Support this show http://supporter.acast.com/dth. Hosted on Acast. See ac…
  continue reading
 
TypeScript is a statically typed superset of JavaScript that adds optional type annotations and modern language features to improve developer productivity and code safety. The TypeScript compiler performs type checking at compile time, catching errors before code is run, and also transforms TypeScript code into clean, standards-compliant JavaScript…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play