Technical interviews about software topics.
Become the best software developer you can be
Machine learning and data science episodes of Software Engineering Daily.
Technical interviews about software topics.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Databases and data engineering episodes of Software Engineering Daily
Open source technology episodes of Software Engineering Daily
Technical interviews about software topics.
Hosts Azam Abdulkadir, Ben Koch, and Collin Cierlak, software / data engineers at the computer vision company GumGum, discuss topics from prominent software engineering publications and explain how they can be applied to your daily workflow.
Conversations with top voices in tech.
S
Software Engineering Daily


1
Postgres Data Warehouse with Josh Drake and Thomas Richter
51:47
51:47
Play later
Play later
Lists
Like
Liked
51:47
A data warehouse is a centralized repository that an enterprise may use to store selected data from production systems. Data is transformed into a structured form that makes it easily accessible for business intelligence or other operational users. SQL-compliant databases are frequently used for data warehouses due to the popularity of SQL as a too…
Studies show that people in “maker” professions such as developers and writers are most productive when they can carve out dedicated time for focused work, without the frequent context-switching that comes with an irregular meeting schedule. Meetings and other non-development work are necessary parts of the job, but a team will be much more product…
WordPress is a free and open-source content management system, or CMS, written in PHP. Since its release in 2003, WordPress has become ubiquitous on the web. It is estimated that roughly 60 million websites use WordPress as a CMS. However, despite its popularity, WordPress has limitations in its design. WordPress sites are dynamic, and the front an…
WordPress is a free and open-source content management system, or CMS, written in PHP. Since its release in 2003, WordPress has become ubiquitous on the web. It is estimated that roughly 60 million websites use WordPress as a CMS. However, despite its popularity, WordPress has limitations in its design. WordPress sites are dynamic, and the front an…
T
The CyberWire Daily


1
RedEcho under investigation (amid reassurances). Stopping Operation Exchange Marauder. Containing Ursnif. Cyber proliferation. And another round in the Crypto Wars.
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27
India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and t…
S
Software Engineering Daily


1
Vantage: AWS Console Alternative with Ben Schaechter
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38
AWS offers over 200 services as part of its IaaS platform, and that number continues to grow. Organizing all of these services, and tracking the costs they incur, can be a significant challenge, often requiring teams of AWS-certified sysadmins working together to get a handle on an enterprise-scale system. Vantage provides an alternative, streamlin…
P
Podcast – Software Engineering Daily


1
Vantage: AWS Console Alternative with Ben Schaechter
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38
AWS offers over 200 services as part of its IaaS platform, and that number continues to grow. Organizing all of these services, and tracking the costs they incur, can be a significant challenge, often requiring teams of AWS-certified sysadmins working together to get a handle on an enterprise-scale system. Vantage provides an alternative, streamlin…
S
Software Daily


1
Vantage: AWS Console Alternative with Ben Schaechter
47:07
47:07
Play later
Play later
Lists
Like
Liked
47:07
AWS offers over 200 services as part of its IaaS platform, and that number continues to grow. Organizing all of these services, and tracking the costs they incur, can be a significant challenge, often requiring teams of AWS-certified sysadmins working together to get a handle on an enterprise-scale system. Vantage provides an alternative, streamlin…
T
The CyberWire Daily


1
India investigates the possibility of cybersabotage. Walls are opaque to defenders, too. Recommendations for cyber nonproliferation. SolarWinds updates (with an SEC appearance).
23:39
23:39
Play later
Play later
Lists
Like
Liked
23:39
Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben …
O
Open Source – Software Engineering Daily


1
Postgres Data Warehouse with Josh Drake and Thomas Richter
46:24
46:24
Play later
Play later
Lists
Like
Liked
46:24
A data warehouse is a centralized repository that an enterprise may use to store selected data from production systems. Data is transformed into a structured form that makes it easily accessible for business intelligence or other operational users. SQL-compliant databases are frequently used for data warehouses due to the popularity of SQL as a too…
P
Podcast – Software Engineering Daily


1
Postgres Data Warehouse with Josh Drake and Thomas Richter
51:47
51:47
Play later
Play later
Lists
Like
Liked
51:47
A data warehouse is a centralized repository that an enterprise may use to store selected data from production systems. Data is transformed into a structured form that makes it easily accessible for business intelligence or other operational users. SQL-compliant databases are frequently used for data warehouses due to the popularity of SQL as a too…
S
Software Daily


1
Postgres Data Warehouse with Josh Drake and Thomas Richter
49:53
49:53
Play later
Play later
Lists
Like
Liked
49:53
A data warehouse is a centralized repository that an enterprise may use to store selected data from production systems. Data is transformed into a structured form that makes it easily accessible for business intelligence or other operational users. SQL-compliant databases are frequently used for data warehouses due to the popularity of SQL as a too…
A
All Hands on Tech

1
070 - Big data in finance with Bismark Adomako
30:43
30:43
Play later
Play later
Lists
Like
Liked
30:43
Daniel speaks with Pluralsight author Bismark Adomako about how big data is impacting the financial industry, best practices for creating a big data strategy at your company, and more. Bismark's Pluralsight author page
T
The CyberWire Daily


1
“RedEcho’s”activity in India’s power grid is described. US report on Khashoggi murder declassified SolarWinds compromise inquiry updates. Ill-intentioned SEO. President’s Cup winner announced.
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30
Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains…
S
Software Engineering Daily


1
Earthly: Build Automation with Vlad Ionescu
50:36
50:36
Play later
Play later
Lists
Like
Liked
50:36
Build automation tools automate the process of building code, including steps such as compiling, packaging binary code, and running automated tests. Because of this, build automation tools are considered a key part of a continuous delivery pipeline. Build automation tools read build scripts to define how they should perform a build. Common build sc…
P
Podcast – Software Engineering Daily


1
Earthly: Build Automation with Vlad Ionescu
50:36
50:36
Play later
Play later
Lists
Like
Liked
50:36
Build automation tools automate the process of building code, including steps such as compiling, packaging binary code, and running automated tests. Because of this, build automation tools are considered a key part of a continuous delivery pipeline. Build automation tools read build scripts to define how they should perform a build. Common build sc…
S
Software Daily


1
Earthly: Build Automation with Vlad Ionescu
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53
Build automation tools automate the process of building code, including steps such as compiling, packaging binary code, and running automated tests. Because of this, build automation tools are considered a key part of a continuous delivery pipeline. Build automation tools read build scripts to define how they should perform a build. Common build sc…
It’s been a minute since we last gathered around the water cooler, as Allen starts an impression contest, Joe wins said contest, and Michael earned a participation award. For those following along in their podcast app, this episode’s show notes can be found at https://www.codingblocks.net/episode153. Sponsors Datadog – Sign up today for a free 14 d…
It’s been a minute since we last gathered around the water cooler, as Allen starts an impression contest, Joe wins said contest, and Michael earned a participation award. For those following along in their podcast app, this episode’s show notes can be found at https://www.codingblocks.net/episode153. Sponsors Datadog – Sign up today for a free 14 d…
T
The CyberWire Daily


1
Aarti Borkar: Make your own choices. [Product} [Career Notes]
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38
Head of Product for IBM Security Aarti Borkar shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche wor…
T
The CyberWire Daily


1
Shining a light on China's cyber underground. [Research Saturday]
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11
Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citiz…
T
The CyberWire Daily


1
Oxford lab studying the COVID-19 virus is hacked. Zoom impersonation campaign. Senators would’ve liked to have heard from Amazon about Solorigate. NSA likes zero trust. NIST IoT guidelines.
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45
Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cy…
S
Software Engineering Daily


1
Semgrep: Modern Static Analysis with Isaac Evans
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40
Static analysis is a type of debugging that identifies defects without running the code. Static analysis tools can be especially useful for enforcing security policies by analyzing code for security vulnerabilities early in the development process, allowing teams to rapidly address potential issues and conform to best practices. R2C has developed a…
P
Podcast – Software Engineering Daily


1
Semgrep: Modern Static Analysis with Isaac Evans
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40
Static analysis is a type of debugging that identifies defects without running the code. Static analysis tools can be especially useful for enforcing security policies by analyzing code for security vulnerabilities early in the development process, allowing teams to rapidly address potential issues and conform to best practices. R2C has developed a…
S
Software Daily


1
Semgrep: Modern Static Analysis with Isaac Evans
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09
Static analysis is a type of debugging that identifies defects without running the code. Static analysis tools can be especially useful for enforcing security policies by analyzing code for security vulnerabilities early in the development process, allowing teams to rapidly address potential issues and conform to best practices. R2C has developed a…
T
The CyberWire Daily


1
PLA spyware keeps Tibetans under surveillance. Cyber conflict between Ukraine and Russia, some conventionally criminal, other state-directed. US Executive Order addresses supply chain resilience.
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38
FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as…
S
Software Engineering Daily


1
Multi-Prem Software Delivery and Management with Grant Miller
55:20
55:20
Play later
Play later
Lists
Like
Liked
55:20
Modern SaaS products are increasingly delivered via the cloud, rather than as downloadable, executable programs. However, many potential users of those SaaS products may need that software deployed on-prem, in a private network. Organizations have a variety of reasons for preferring on-prem software, such as security, integration with private tools…
P
Podcast – Software Engineering Daily


1
Multi-Prem Software Delivery and Management with Grant Miller
55:20
55:20
Play later
Play later
Lists
Like
Liked
55:20
Modern SaaS products are increasingly delivered via the cloud, rather than as downloadable, executable programs. However, many potential users of those SaaS products may need that software deployed on-prem, in a private network. Organizations have a variety of reasons for preferring on-prem software, such as security, integration with private tools…
S
Software Daily


1
Multi-Prem Software Delivery and Management with Grant Miller
53:41
53:41
Play later
Play later
Lists
Like
Liked
53:41
Modern SaaS products are increasingly delivered via the cloud, rather than as downloadable, executable programs. However, many potential users of those SaaS products may need that software deployed on-prem, in a private network. Organizations have a variety of reasons for preferring on-prem software, such as security, integration with private tools…
S
Software Engineering Daily


1
Digital Ocean Platform with Cody Baker and Apurva Joshi
55:27
55:27
Play later
Play later
Lists
Like
Liked
55:27
Cloud platforms are often categorized as providing either Infrastructure-as-a-Service or Platform-as-a-Service. On one side of the spectrum are IaaS giants such as AWS, which provide a broad range of services for building infrastructure. On the other are PaaS providers such as Heroku and Netlify which abstract away the lower-level choices and focus…
P
Podcast – Software Engineering Daily


1
Digital Ocean Platform with Cody Baker and Apurva Joshi
55:27
55:27
Play later
Play later
Lists
Like
Liked
55:27
Cloud platforms are often categorized as providing either Infrastructure-as-a-Service or Platform-as-a-Service. On one side of the spectrum are IaaS giants such as AWS, which provide a broad range of services for building infrastructure. On the other are PaaS providers such as Heroku and Netlify which abstract away the lower-level choices and focus…
S
Software Daily


1
Digital Ocean Platform with Cody Baker and Apurva Joshi
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20
Cloud platforms are often categorized as providing either Infrastructure-as-a-Service or Platform-as-a-Service. On one side of the spectrum are IaaS giants such as AWS, which provide a broad range of services for building infrastructure. On the other are PaaS providers such as Heroku and Netlify which abstract away the lower-level choices and focus…
T
The CyberWire Daily


1
Accellion FTA compromise spreads. Ocean Lotus is back. LazyScripter seems to represent a new threat group. Notes from the SolarWinds hearings. New ICS threat actors.
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
T
The CyberWire Daily


1
DDoS in hybrid war. Accellion compromise attributed. Initial access brokers. Agile C2 for botnets. US Senate’s SolarWinds hearing. US DHS cyber strategy. Shiny new phishbait.
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
Jeremy speaks with Chris Sells, who is a Senior Product Manager at Google with the Flutter team. They discuss progressive web apps, Flutter, and online backgammon over Telnet.
Yelp.com is a crowdsourced review platform focused on restaurants and local businesses. Originally created as an email-based recommendation service, Yelp re-launched in its modern form in 2005. At the time, its focus on user-created reviews and social interactions was fairly novel, and made it stand out from competitors such as Angie’s List and Cit…