show episodes
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Paul Ford and Ben Popper, the series features questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. Founded in 2008, Stack Overflow is empowering the world to develop technology through collective knowledge. It’s best known for being the largest, most trusted online commun ...
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Learn how to get the best performance and scale your PostgreSQL database with our weekly shows. Receive the best content curated from around the web. We have a special focus on content for developers since your architecture and usage is the key to getting the most performance out of PostgreSQL.
 
d
devMode.fm

1
devMode.fm

Andrew Welch, Ryan Irelan

Unsubscribe
Unsubscribe
Monthly+
 
devMode.fm is a bi-weekly podcast dedicated to the tools, techniques, and technologies used in modern web development. We cover JavaScript frameworks like React, Vue.js, and Svelte, tooling like webpack, Docker, Nginx, Next, Nuxt, etc. and CMS systems like Craft CMS.
 
Curiouscast and Global News present the second season in the “Rising” series: China Rising is an in-depth investigation into modern China and its strained relations with the West. Hosted by Global News Senior Correspondent Jeff Semple, this ten episode season investigates allegations Beijing is applying pressure and working to infiltrate the upper echelons of power in Western countries, including Canada. The Chinese government is accused of deploying a range of tactics, from disinformation t ...
 
Loading …
show series
 
Context is critical, but what does that mean? What are the parts of context you should care about? In this episode, we talk specifically about temporal context, and how you can think about context in terms of "inner" and "outer" layers. 🙏 Today's Episode is Brought To you by: Compiler Compiler is a brand new podcast from RedHat where the hosts answ…
 
Richard Paterson of Think Less and Grow Rich talks about why you don't need a peaceful mind to experience peace Episode 2106: Why You Don’t Need A Peaceful Mind To Experience Peace by Richard Paterson of Think Less and Grow Rich Richard is an ex-monk, meditation teacher, transformational coach and author of two books, “Kick The Thinking Habit” and …
 
The Enneagram of Personality, or just the Enneagram, is a representation of personalities using a geometric figure, also called an enneagram (little e), to express nine interconnected personality types. While each type is unique it is related to other types through the circle connecting the type to each of it’s wings and the lines or arrows in the …
 
Should we all be software engineers? Carl and Richard talk to Chad Michel and Doug Durham about the discipline of software engineering - separate from computing science and software development. Doug and Chad discuss the elements of lean engineering in software, referencing their book Lean Software Systems Engineering for Developers. The conversati…
 
In this episode of Syntax, Scott and Wes talk about all the new stuff in ES2022 — what it is, why you might need it, and how to use it. Sanity - Sponsor Sanity.io is a real-time headless CMS with a fully customizable Content Studio built in React. Get a Sanity powered site up and running in minutes at sanity.io/create. Get an awesome supercharged f…
 
In this episode Matt and Mike sit down with Yuri, a newcomer to development and Tech Twitter. Yuri recently started her programming journey after watching a single random YouTube video that showed up in her feed. Soon after starting her journey, Yuri took to Twitter to share her experiences, netting her a whopping 27.3k followers (as of writing thi…
 
Leading up to today’s discussion, we have talked about the psychological safety, and dependability of the Aristotle Project. Today, we tackle structure and clarity. We discuss a statement that lists understanding of job expectations, the process for fulfilling them, and knowing the consequences of one’s performance as important pillars for team eff…
 
Jesse is a principal developer, specializing in web and mobile and has been programming in C# for 20 years. He is a Microsoft MVP, a Xamarin MVP, an author, and he creates on-line courses for Pluralsight, LinkedIn Learning, Udemy, and Pakt. He is the author of 18 books, the latest of which is Git for programmers. Links https://twitter.com/JesseLibe…
 
On this special edition of The Changelog, we’re talking with Cory Wilkerson, Senior Director of Engineering at GitHub, about GitHub Codespaces. For years now, the possibility of coding in the cloud seemed so close, yet so far away for a number of reasons. According to Cory, the raw ingredients to make coding in the cloud a reality have been there f…
 
In this episode, Tracy Lee sits down with Stephen Fluin from Chainlink to talk about blockchain and why JavaScript developers should start learning about it today. We go over the difference between blockchain and cryptocurrency, and how the two work together. We also explore use cases for developers and interesting decentralized applications one ca…
 
#123: When you have an application designed using the microservice architecture, where the microservice being developed interact with other services using events from messaging queues and HTTP requests, how can you avoid having all the services on your laptop and still have isolation between different application developers? We will discuss some te…
 
In this episode, we talk about how to transition into development after over a decade in your field, with Christine Fletcher, UI/UX developer/designer at capSpire. Christine talks about experiencing burnout working as a nurse and deciding to take the leap to learn to code, what her experience was going the bootcamp route to learn, and how she lande…
 
Denial-of-service at a German election agency, as Federal prosecutors investigate GhostWriter. More nation-states get into election meddling. South Africa works to recover from a ransomware attack against government networks. A cryptojacking botnet moves from Linux to Windows. A ransomware gang threatens to burn your data if you bring in third-part…
 
A strange press release went out on September 13th. Retail giant Walmart, it seemed, would soon be accepting crypto currency. “The eCommerce giant intends to give its millions of shoppers across the world an opportunity to seamlessly make payments with cryptocurrencies,” the press release said. The press release was bullshit. The world of cryptocur…
 
Facebook’s goal is to connect the world and allow every human to foster better relationships. Today is a rare treat. Mark Zuckerberg is the CEO of Facebook. After I spent nearly 3 years writing a book about how his company works, he has finally agreed to do an interview. Special thanks to Jennifer Li at Andreessen Horowitz for the introduction and …
 
Web applications often have some sort of login system, and once a user creates an account, they have access to features anonymous users can’t see. In time, application designers will often add an admin level of access for special users. This is often a slow trickle of technical debt. Proper execution of a programmatic authorization system requires …
 
Travis CI security vulnerability is bad news for open source Ransomware accounts for a quarter of cyber insurance claims Microsoft goes passwordless Thanks to our episode sponsor, Sonrai Sonrai is changing Public Cloud Security by focusing on protecting data from over-privileged human and non-human identities. Sonrai provides a single pane of glass…
 
Former McAfee CTO Rosen Sharma–now CEO of BlueStacks, now.gg, and Game.tv–discusses his transition into gaming and where software distribution in the industry may be headed, including his thoughts on a future beyond mobile app stores. It may come sooner than you think. Support our sponsors Appfigures This show was sponsored by Appfigures! Appfigure…
 
Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about how some of the most successful and lucrative online scams employ a “low-and-slow” approach, Joe's story is about 2 Arkansas farmer that scammed inves…
 
Hancitor Campaign Abusing Microsoft's OneDrive https://isc.sans.edu/forums/diary/Hancitor+campaign+abusing+Microsofts+OneDrive/27838/ "Secret"Agent Exposes Azure Customers To Unauthorized Code Execution https://www.wiz.io/blog/secret-agent-exposes-azure-customers-to-unauthorized-code-executionBy Johannes B. Ullrich, Ph.D.
 
That Russian crackdown on ransomware gangs people thought they were seeing? Hasn’t happened, at least according to the FBI. The Cyber Partisans take a virtual whack at President Lukashenka’s government in Belarus. Operation Harvest is complicated and long-running. Phishing with a promise of infrastructure funding. The criminal market for bogus vacc…
 
While every developer loves a good story about discovering and fixing a gnarly bug, not everyone enjoys the work of finding those bugs. Most folks would prefer to be writing business logic and solving new problems. But those input validation errors and resource leaks won’t solve themselves. Or will they? AWS Bug Bust is a global competition launche…
 
The more you read into it, the worse it gets. At least we have new devices to keep us happy. Sponsored By: A Cloud Guru: A Cloud Guru now includes Cloud Playground. Azure, AWS, or GCP Sandboxes at your fingertips. Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Datadog: Try Datadog free by starting a your…
 
#124: If you are an application developer, more than likely you work with some sort of data set. But what do you do when you have sensitive data like credit card numbers, social security numbers or something as simple as a first and last name? Enter Tonic.ai and their solution: de-identification of data. They take your sensitive data and de-identif…
 
As developers hone their craft, becoming more productive often means learning utilities and tools at the command line. The right combination of various parsing commands chained together through pipes can enable engineers to quickly and efficiently automate many adhoc data processing tasks. In this episode I speak with Adam Gordon Bell about some of…
 
Apple issues urgent updates to fix new zero-day linked to Pegasus spyware Update Google Chrome to patch 2 new zero-day flaws under attack New Zloader attacks disable Windows Defender to evade detection Thanks to our episode sponsor, Sonrai Sonrai is gaelic for data - and that’s what Sonrai Security is all about. Finding, classifying, and locking do…
 
Jay Harrington of Life and Whim reminds us that the happiest moments of vacation may not be what you think they are Episode 2105: The Happiest Moments of Vacation May Not Be What You Think by Jay Harrington of Life and Whim Jay and Heather Harrington are the husband and wife team behind Life and Whim. They started Life and Whim after moving their f…
 
Picture of the Week. A new worrisome 0-day attack against Office documents. Work From Home (WFH) — No problem? "Attacks only ever get better" The return of REvil — Apparently, vacation's over. Closing the Loop. I have this next piece under "Science Fiction" — but is it fiction??? The Mēris Botnet. We invite you to read our show notes at https://ww…
 
On this week’s show Patrick Gray and Adam Boileau discuss recent security news, including: Apple 0day has everyone freaking out So much more 0day in the wild American Project Raven staffers settle with DoJ Two absolutely bonkers Azure security problems SEC tells corporate America to spill on breaches Much, much more In this week’s sponsor interview…
 
Citizen Lab finds, and Apple patches, a zero-day used for zero-click installation of Pegasus spyware. A Cobalt Strike beacon has been turned to cyberespionage use against Linux targets. The Russian government could, it seems, take action against cybercrime, but its will-to-enforcement seems to be inconsistent. Ben Yelin from UMD CHHS with more on A…
 
Modern companies leverage dozens or even hundreds of software solutions to solve specific needs of the business. Organizations need to collect all these disparate data sources into a data warehouse in order to add value. The raw data typically needs transformation before it can be analyzed. In many cases, companies develop homegrown solutions, thus…
 
Most developers we know are constantly learning new things and growing their skills. Jort Rodenburg has been a book reviewer for Manning for several years and was approached to write a book on C# which he thought would be a great opportunity to grow. His book, Code like a Pro in C#, was a great learning experience for him and is intended to help br…
 
SSID Stripping is a new take on spoofing Industrial control systems hammered by cyber attacks Olympus has fallen...to ransomware Thanks to our episode sponsor, Sonrai Are you a security expert who’s afraid to admit you don’t know what the heck is going on in your cloud? Relax. Public cloud security is overwhelming. Figuring out where to start, and …
 
Helene Massicotte of Free To Pursue talks about why it's so hard to settle debts of gratitude Episode 2104: Why It’s So Hard To Settle Debts Of Gratitude by Helene Massicotte of Free to Pursue on Showing Appreciation Helene Massicotte blogs about living life on your terms and experiencing true personal freedom. She describes herself as a person in …
 
Weaveworks helps DevOps folks manage their Kubernetes settings entirely Paul's first computer was a Sinclair ZX-80, which had a clock speed of 3.25 MHz, 1 KB of static RAM ,and 4 KB of read-only memory. Pretty good for 1980. Weaveworks based their project on Flux, an open source engine. If you're not a big corporation and you want to use it, it's f…
 
Apple Updates Everything https://support.apple.com/en-us/HT201222 Citizenlab Discloses NSO Exploit Details https://citizenlab.ca/2021/09/forcedentry-nso-group-imessage-zero-click-exploit-captured-in-the-wild/ Google Chrome Update https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html WooCommerce Multi Currency Plugin V…
 
The Meris botnet continues to disrupt New Zealand banks, and has turned up elsewhere, too. Mustang Panda compromised Indonesian government networks. North Korean operators are using social media to soften up their prospective targets. Al Qaeda sympathizers marked the twentieth anniversary of 9/11 by calling for--what else?--more 9/11s. Malek Ben Sa…
 
In this episode, Dave and Jamison answer these questions: Questions Listener Lisa asks, Hi Dave and Jamison! How do you answer the statement “You’re very quiet. Like really quiet”? Me? I tend to give a small smile or recently, I said “I know.” I’m a software developer in a large defense company and I’m on my third and final year of my rotational pr…
 
Darknet Diaries, Jack Rhysider’s show, is the most popular cyber security podcast – and one of the most successful tech podcasts in the US in general. Eliad Kimhy spoke with Jack about the origins of Darknet Diaries, his heroes and role models, and the effect the show’s success has had on his personal life – which, you might be surprised to discove…
 
In this Hasty Treat, Scott and Wes talk about Wes’ new satellite internet setup — best use-cases and how to set it up. Sentry - Sponsor If you want to know what’s happening with your code, track errors and monitor performance with Sentry. Sentry’s Application Monitoring platform helps developers see performance issues, fix errors faster, and optimi…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login