Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

The Continuous Engineering Experts Podcasts

show episodes
 
Artwork

1
Semaphore Uncut

Semaphore CI

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast for developers about building great products. Join us in discussing engineering excellence with top experts and sharpening your coding skills with technical tips from the Semaphore team. Your host is Semaphore’s co-founder, Darko Fabijan.
  continue reading
 
Artwork

1
Raising Health

Andreessen Horowitz, a16z Bio + Health

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A myriad of AI, science, and technology experts explore the real challenges and enormous opportunities facing entrepreneurs who are building the future of health. Raising Health, a podcast by a16z Bio + Health and hosted by Kris Tatiossian and Olivia Webb, dives deep into the heart of biotechnology and healthcare innovation. Join veteran company builders, operators, and investors Vijay Pande, Julie Yoo, Vineeta Agarwala, and Jorge Conde, along with distinguished guests like Mark Cuban, Greg ...
  continue reading
 
Hosted by Max and Zach, The Structural Engineering Podcast dives into the world of structural design, real-world engineering challenges, and the stories behind the structures that shape our world. Whether you're a practicing engineer, an aspiring student, or just curious about how buildings stand tall, tune in for expert insights, industry interviews, and relatable experiences from the field. TheEngineeringPodcast.com
  continue reading
 
Paramedic training is over, you’re in the front seat now. Whether day 1 or day 1,000 you can’t shake the fear you’re underprepared. You were taught to systematically decide if A... do B. But what if “A” wasn’t in the book? The truth is each emergency call is too unique to teach the right response to every situation. We need to go beyond algorithmic thinking and understand deeper principles, the WHY behind the algorithm. When every decision counts you want to rely on a framework that will gui ...
  continue reading
 
Artwork
 
SearchSoftwareQuality editors interview experts in the fields of software development, testing, Agile, DevOps, project management, CI, CD and chaos engineering to learn how enterprises address these modern IT concerns.
  continue reading
 
Artwork

1
321-Gang

The Continuous Engineering Experts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Strategy. Execution. Results. Offering consulting, training & software solutions for companies building complex, highly regulated systems. Learn more @ www.321gang.com
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course— your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
  continue reading
 
I would like to welcome and thank your for visiting Blueprint Your Career podcast. My goal for this podcast is to help you find the right career and offer motivation to help you obtain your career goals. I will do that by talking to people in various Science, Technology, Engineering, Mathematics, and Medical careers. Interviewing career and motivational experts. I hope to provide continuous awareness of the various careers that exist both the most popular and the unknown!
  continue reading
 
Artwork
 
Join us every other week on "Test Case Scenario" presented by Sauce Labs, where our expert panel dives into the exciting and ever-changing landscape of technology, pop culture, and business. Host Jason Baum, Director of Community at Sauce Labs, will lead the discussion with our esteemed recurring panelists: Marcus Merrell, VP of Technology Strategy; Nikolay Advolodkin, Senior Developer Advocate and Evelyn Coleman, Manager of Implementation Engineering. Get ready to uncover the impact of cont ...
  continue reading
 
Artwork

1
EWN - Engineering With Nature

USACE and Story Studio Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
For more than 10 years, the U.S. Army Corps of Engineers has been working on an initiative called Engineering With Nature that uses natural processes and systems to deliver a broad range of economic, environmental, and social benefits. EWN, as it is called, is developing and implementing nature-based solutions for infrastructure, engineering, and water projects. EWN brings together a growing international community of scientists, engineers, and researchers, from all kinds of disciplines to c ...
  continue reading
 
Artwork

1
The Pipeline: All Things CD & DevOps Podcast by The CD Foundation

Jacqueline Salinas, Director of Ecosystem & Community Development

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Pipeline: All Things CD & DevOps is created and hosted by the CD Foundation's Director of Ecosystem & Community Development - Jacqueline Salinas. This is a series of interviews with industry experts, leaders, and innovators. The Pipeline will cover a range of topics that are centered around CD & DevOps. The CDF’s goal is to educate, entertain, provide tips and insights to make the community better software engineers. The intent is to supply up-to-date industry news and innovations, as we ...
  continue reading
 
Connecticut has the expertise, technology, innovation and institutional memory to be a worldwide leader in manufacturing once again. Hear experts from business, education and government share their thoughts on the resources, infrastructure, manpower and commitment needed to strengthen Connecticut manufacturing. Learn about the high paying careers and financial stability today’s clean, technology-driven manufacturing can deliver. Building a stronger Connecticut is why Manufacturing Matters.
  continue reading
 
Artwork

1
DevOps Chat

DevOps.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
  continue reading
 
Artwork

1
Compliance Therapy™

Risk. Security. Compliance. Get It Together.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
  continue reading
 
Loading …
show series
 
Cancer care in the U.S. costs over $250 billion each year, and nearly 2 million Americans receive a new diagnosis annually, yet too often the journey begins with silence: no call, no plan, no guide. In this episode, a16z’s Vineeta Agarwala and Jay Rughani talk with Thyme Care leaders Robin Shah (cofounder and CEO), Bobby Green, MD (president and CM…
  continue reading
 
Understanding the toxidromes provides you with vital diagnostic tools in high-stakes environments. In this episode, we break down the clinical patterns that define toxidromes- the clusters of signs and symptoms that point to poisoning or overdose. We explore the hallmark features of the most common toxidromes, highlight common pitfalls in recogniti…
  continue reading
 
In this episode, Darko welcomes Sarah Novotny, a technology leader with 25+ years of experience. From shaping Kubernetes governance at Google to her current work on AI security with the Coalition for Secure AI, Sarah brings deep insight into how open source and governance shape the future of tech. Like this episode? Be sure to leave a ⭐️⭐️⭐️⭐️⭐️ re…
  continue reading
 
Melody Bishop helps us simplify the physiology of bag-valve-mask (BVM) techniques. This episode highlights common mistakes like insufficient exhalation time, discusses driving pressure, and explains the importance of proper technique to avoid lung injury. We also explore the nuances of endotracheal tube size, laminar flow, and the transition from B…
  continue reading
 
Dr. Jeff Jarvis, EMS medical director and host of the EMS Lighthouse Project, delves into the latest emerging EMS literature and guidelines from the National Association of EMS Physicians. We explore best practices for blood use in trauma, up-to-date trauma arrest recommendations, postpartum hemorrhage, and severe hypertension in pregnancy. Additio…
  continue reading
 
In this episode of Technical Tips, we break down GPT-OSS — OpenAI’s open-source LLMs you can run anywhere. From local setup to cloud hosting, fine-tuning, and performance tips — here’s everything you need to get started with GPT-OSS. Like this episode? Be sure to leave a ⭐️⭐️⭐️⭐️⭐️ review on the podcast player of your choice and share it with your …
  continue reading
 
In this episode, Darko welcomes Mathias Buus Madsen, CEO of Holepunch and creator of Pear Runtime. Mathias shares how peer-to-peer tech and modular architecture let developers build apps without AWS or cloud lock-in. Like this episode? Be sure to leave a ⭐️⭐️⭐️⭐️⭐️ review on the podcast player of your choice and share it with your friends. 🎙️ This …
  continue reading
 
What's the real difference between paramedics who stay calm under pressure and those who panic when everything goes wrong? It's the ability to already know what comes next. In this episode we explore the power of consistency and how one simple tool, often dismissed, can improve patient care and outcomes. Geoff Murphy, founder of Master Medics, sat …
  continue reading
 
Were have we been? Well, the truth is, we've been incredibly busy working on some really exciting projects. If you're interested in joining the founding members cohort of the Paramedic Confidence Builder Course reach out to me at [email protected] before August 15th. Project #1: Understanding New Paramedic Challenges We launched a research projec…
  continue reading
 
In this episode, Julie Yoo and Jay Rughani are joined by Thatch cofounders Chris Ellis and Adam Stevenson to explore why ICHRA—a more recent policy innovation—might quietly revolutionize employer-sponsored health benefits. Unpacking the surprising history of how U.S. healthcare became entangled with employment, they make the case for a defined-cont…
  continue reading
 
In today’s episode of Technical Tips, Semaphore engineer Veljko Maksimovic shares how we’re using ephemeral environments to test open-source projects across multiple clouds. From spinning up short-lived environments with Infrastructure as Code to running cross-cloud acceptance tests — hear how we’re improving test coverage, speeding up feedback loo…
  continue reading
 
In this episode, Sprinter Health co-founders Max Cohen and Cameron Behar sit down with Julie Yoo to unpack how their home-based care model reaches underserved populations and reintegrates “the unengaged” into the healthcare system. From starting with blood draws in living rooms to scaling a high-complexity, tech-enabled logistics platform, they sha…
  continue reading
 
In this episode of Semaphore Uncut, we chat with Sara Vieira—developer, speaker, and hardware hacker—about her unconventional path into tech, the communities that shaped her, and why she’s diving into Game Boys and 3D printing while everyone else is chasing AI. Like this episode? Be sure to leave a ⭐️⭐️⭐️⭐️⭐️ review on the podcast player of your ch…
  continue reading
 
This episode we are talking with Melissa Lanning, an architect with Infusion Architects based out of Colorado. Melissa is the first architect we've asked to be on the show, it took 5 years of practice but we're ready to talk with the most common client for structural engineers, and learn how we can navigate the structural/architectural work dynamic…
  continue reading
 
In this episode of Technical Tips, Semaphore engineer Amir Hasanbašić shares how we’re rebuilding our API from the ground up. From a fragmented system to a unified interface — hear how we tackled legacy challenges, redesigned for scale, and what we learned along the way. If you're into API architecture or scaling big systems, this one’s for you. Li…
  continue reading
 
Renowned airway enthusiast, Dr. Rich Levitan, on mastering airway management. Explore his approach to simplifying complex tasks into achievable and believable steps. Every complexity incurs a debt to crisis performance, instead, learn how we can decrease stress and engineer success in crisis performance. Resources YouTube link- https://www.youtube.…
  continue reading
 
This week is a conversation with Kee Leung. Kee is the director of Odace engineering, a firm in London that specializes in efficient structural systems, both in design and development. Take a look at the Website here: https://www.odace.co.uk/ A weird instagram link that shows this beam: Here Also, we are starting a structural trivia, One email a we…
  continue reading
 
Not everyone passes on the first try—but failure doesn’t define your journey. In this episode, we guide you through a structured plan for recovery if you don’t pass the CISSP exam. We cover how to interpret your exam feedback, identify weak domains, revise your study strategy, and rebuild confidence. You’ll also learn how to maintain momentum and a…
  continue reading
 
Earning your CISSP opens new doors—but where you go next depends on your goals. In this episode, we explore the post-CISSP landscape, including leadership roles like CISO, and technical specializations like cloud security and digital forensics. We also review advanced certifications such as CCSP, CISM, CRISC, and the CISSP concentrations in archite…
  continue reading
 
The CISSP exam uses Computerized Adaptive Testing (CAT), which means question difficulty and test length vary based on your performance. In this episode, we demystify the CAT format, explain how scoring works, and share strategies to manage your time across the exam. You’ll learn when to move quickly, when to slow down, and how to pace yourself und…
  continue reading
 
CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropriate,” and “least likely.” We explain what each prompt is asking you to consider—whether it’s prioritization, sequencing, or judgment—and how to choose the answer that aligns with ISC2…
  continue reading
 
CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find the real point being tested. You'll learn how to identify the scenario, isolate the question stem, and evaluate answer choices using elimination strategies. We also discuss common distr…
  continue reading
 
With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym expansions to help you remember everything from the OSI model and CIA triad to the phases of incident response and risk treatment options. You’ll also learn strategies for reducing cogni…
  continue reading
 
Some CISSP topics consistently challenge even experienced professionals. In this episode, we break down ten of the most difficult concepts on the exam—ranging from cryptographic key lifecycle and security models to risk calculations and legal frameworks. We clarify the nuances, provide examples, and share memory aids to help you master these areas.…
  continue reading
 
DevSecOps is not just a toolset—it’s a culture that integrates security into every phase of the software development lifecycle. In this episode, we explore how DevSecOps breaks down silos between development, operations, and security teams. Topics include automated security testing, continuous compliance checks, secure coding training, and real-tim…
  continue reading
 
APIs enable system integration but can expose your infrastructure to serious vulnerabilities if not secured properly. This episode focuses on how to design and manage secure APIs. We cover authentication methods (API keys, OAuth), input validation, rate limiting, logging, and error handling. You’ll also learn about common API security issues like b…
  continue reading
 
Mobile apps introduce unique risks due to their widespread use, diverse platforms, and limited control over user devices. In this episode, we explore mobile app security concerns, including insecure storage, weak authentication, exposed APIs, and code tampering. We also introduce reverse engineering concepts—how attackers decompile apps to uncover …
  continue reading
 
Not all applications should be allowed to run in your environment. This episode explores application control mechanisms like whitelisting and sandboxing. You'll learn how whitelisting enforces control by allowing only approved executables, and how sandboxing isolates applications to prevent them from affecting system integrity. We also discuss impl…
  continue reading
 
Version control systems track changes to code—but they also need to be protected themselves. This episode explores how tools like Git help enforce code integrity, collaboration, and traceability across development teams. We cover commit histories, branching strategies, and how to detect unauthorized or malicious changes. You’ll learn about tagging,…
  continue reading
 
Secure development doesn't stop at writing code—it includes how that code is built, tested, and deployed. In this episode, we explore configuration management and continuous integration/continuous delivery (CI/CD) pipelines. We discuss how insecure configurations, exposed secrets, and unmonitored automation can lead to compromise. Topics include in…
  continue reading
 
Source code repositories are central to modern software development—and to software security. This episode covers the security considerations for using platforms like GitHub, GitLab, Bitbucket, and internal repositories. We examine access control policies, branching strategies, commit tracking, and how to detect malicious code changes. You’ll learn…
  continue reading
 
Security testing helps ensure software behaves as intended under hostile conditions. In this episode, we explore different application security testing methodologies, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). We explain how each method work…
  continue reading
 
Many devastating cyberattacks originate from well-known coding flaws. This episode examines classic vulnerabilities including buffer overflows, SQL injection, and other input-related attacks. We explain how these issues arise, what they allow attackers to do, and how to defend against them using secure coding, bounds checking, input validation, and…
  continue reading
 
The OWASP Top 10 is a widely recognized list of the most critical security risks to web applications. In this episode, we walk through each entry—from injection and broken authentication to cross-site scripting, insecure deserialization, and insufficient logging. You'll learn how these vulnerabilities occur, the business impact they can have, and t…
  continue reading
 
User input is one of the most common vectors for exploitation in modern applications. In this episode, we focus on two critical programming techniques: input validation and output encoding. We explain how to validate input to ensure it meets expected formats and prevents attacks like SQL injection and cross-site scripting (XSS). We also explore how…
  continue reading
 
Secure applications start with secure design. In this episode, we explore how to incorporate security into architecture and code from the very beginning. Topics include threat modeling, input validation, secure defaults, and fail-safe mechanisms. We also cover secure coding practices that prevent common vulnerabilities such as injection, buffer ove…
  continue reading
 
Development methodologies have a direct impact on how security is integrated into software projects. This episode compares three major approaches—Waterfall, Agile, and DevOps—and how each handles risk, testing, and control. You'll learn the strengths and challenges of each model, including change management, documentation, and time-to-delivery. We …
  continue reading
 
Secure software doesn’t happen by accident—it’s the result of disciplined development practices. This episode explores common Software Development Lifecycle (SDLC) models, including waterfall, spiral, and V-model, and how they structure phases such as requirements, design, coding, testing, deployment, and maintenance. We also discuss where and how …
  continue reading
 
The Security Operations Center (SOC) is the nerve center of cybersecurity monitoring and incident response. In this episode, we explore SOC roles, responsibilities, staffing models, tools, and key performance indicators. We discuss shift scheduling, escalation paths, use cases, and integration with threat intelligence feeds. You'll also learn about…
  continue reading
 
People are at the heart of every security program—and also one of its greatest vulnerabilities. In this episode, we examine personnel security controls that mitigate human-based risks. Topics include background checks, onboarding protocols, security training, acceptable use policies, and ongoing behavior monitoring. We also explore separation of du…
  continue reading
 
Cybersecurity extends into the physical world, where threats like unauthorized access, theft, and sabotage can bypass digital defenses. In this episode, we explore physical security operations, including the use of barriers, locks, access control systems, security guards, surveillance cameras, and visitor management. We also cover how physical secu…
  continue reading
 
Understanding malware is essential for effective defense. This episode explores how security teams analyze and contain malicious software, including viruses, worms, ransomware, and trojans. We break down static and dynamic analysis techniques, sandboxing environments, signature development, and reverse engineering basics. You'll also learn how to c…
  continue reading
 
Not all threats come from the outside. Insider threats—whether malicious or accidental—pose a significant risk to organizational security. In this episode, we examine how to identify, monitor, and respond to threats from employees, contractors, or partners with legitimate access. We discuss behavioral indicators, user activity monitoring, data loss…
  continue reading
 
Endpoints remain a primary target for cyberattacks, and protecting them requires more than traditional antivirus solutions. This episode explores Endpoint Detection and Response (EDR), a modern approach to securing laptops, desktops, servers, and mobile devices. We explain how EDR tools provide real-time monitoring, behavioral analysis, threat hunt…
  continue reading
 
Data doesn’t disappear just because you delete it. In this episode, we focus on how to securely dispose of media and sanitize storage devices to prevent data recovery. We cover techniques such as overwriting, degaussing, cryptographic erasure, and physical destruction, as well as when and how to apply each. You’ll also learn about documentation req…
  continue reading
 
Security isn’t just about stopping bad changes—it’s about managing all changes effectively. In this episode, we examine the formal process of change control: how to submit change requests, perform impact assessments, obtain approvals, test in controlled environments, and document results. We also cover the importance of change advisory boards (CABs…
  continue reading
 
Unpatched systems are one of the leading causes of successful cyberattacks. In this episode, we explore the role of patch management and configuration control in maintaining secure and reliable systems. We explain how to evaluate patches, schedule deployments, and monitor success. You'll also learn how to track configuration baselines, control chan…
  continue reading
 
Plans are only useful if they’re tested. In this episode, we explore the various methods for testing business continuity and disaster recovery plans—including walkthroughs, simulations, functional tests, and tabletop exercises. We discuss how to design tests, involve key stakeholders, and evaluate performance without disrupting operations. You’ll l…
  continue reading
 
When disaster strikes, organizations must restore operations quickly—and with minimal data loss. This episode focuses on Disaster Recovery Planning (DRP), particularly the metrics used to guide recovery strategies: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). We explain how to define recovery priorities, select appropriate back…
  continue reading
 
The reliability of evidence hinges on how it’s handled. In this episode, we dive deeper into the principles and techniques for acquiring and preserving digital evidence. Topics include imaging storage media, capturing memory dumps, recording live sessions, and documenting every step in the collection process. We also address how to avoid contaminat…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play