show episodes
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
 
The CodeNewbie podcast was born from CodeNewbie, an organization which fosters a supportive, international community of people learning to code. Each season, host Saron Yitbarek delivers stories and interviews from people of diverse backgrounds and expertise about their coding journeys, as well as beginner friendly discussions about the tech you should know about.
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
H
Hacked

1
Hacked

Sticks & Stones

Unsubscribe
Unsubscribe
Monthly
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
The adventures of Matt Lawrence and Mike Karan through the world of web development, web design, and small business management. We‘ll be covering all the latest JavaScript news as well as JavaScript Frameworks like Vue, React, and Svelte. We‘ll stay on top of the industry so you don‘t have to.
 
S
Self-Hosted

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
Web development discussions and interviews from Peter Fisher. Covering JavaScript, Linux, Docker, PHP, Python, MYSQL, HTML and more Peter Fisher is a freelance web and mobile developer in Gloucestershire UK and the Host of the How To Code Well YouTube channel. If you have any feedback or wish to do a collaboration then please get in touch.
 
Loading …
show series
 
Originally published on February 8, 2022 We are taking some time off from production. We will be back with new episodes on July 6th. Paige Niedringhaus, Staff Software Engineer at Blues Wireless and author of the Modernizing React Apps course, joins us to talk about keeping your React application up to date, challenges React developers are experien…
 
In this supper club episode of Syntax, Wes and Scott talk with Shawn Wang about his thoughts on developer experience, why DX is important, and the importance of learning in public. Hasura - Sponsor With Hasura, you can get a fully managed, production-ready GraphQL API as a service to help you build modern apps faster. You can get started for free i…
 
Huge thanks to the more than 73,000 devs from 180 countries who spent 15 minutes each completing our 2022 Developer Survey. This year’s survey was longer than usual, since we wanted to ask about new topics as well as provide a historical throughline to understand how your responses have changed over the years. Among the takeaways from the survey: 2…
 
Change log I'm currently running experiments with Kubernetes CornJobs I've done lots of under the hood security tweaks with howtocodewell.net I've started using Jira to manage spikes and delivery tickets for the deployment stage of howtocodewell.net I've added tickets for some upgrade work, Symfony 6, NPM 16 LTS, PHP 8.1 On Tuesday we progressed th…
 
Defining your audience is critical to a good meeting. If you haven't defined your audience... who is the meeting even for? 📮 Ask a Question If you enjoyed this episode and would like me to discuss a question that you have on the show, drop it over at: developertea.com. 📮 Join the Discord If you want to be a part of a supportive community of enginee…
 
Most development shops with multiple departments, software packages, or teams will gravitate towards having separate repositories for their various bits of code. If they have to share code, they stand up a server someone to serve up things like nuget and npm packages for whatever system happens to need them. This works great, as long as those separ…
 
Get back to basics with our first episode re-release. This week due to Mike being out sick and Matt being on vacation, the duo have decided to shine a spotlight on one of their most popular episodes that take us all back to the very basics of web development. Back to vanilla HTML, CSS, and JS - some of the most useful skills to have when making sma…
 
Karl Wiegers, Principal Consultant with Process Impact and author of 13 books, discusses specific software development practices that can help you make sure that you don't repeat the same problems he sees time and time again with every customer...By IEEE Computer Society
 
We’re experimenting with something new: a super-brief Monday edition of “The Changelog” to help start your week off right and keep you up with the fast-moving software world. If you like this, would listen to it, and want us to keep it going… let us know in the comments or by tweeting @changelog. If you’d rather we didn’t… also let us know! Discuss…
 
Tomas Trajan, Google Developer Expert for Angular and Web technologies, joins the show today to discuss NgRx and best practices. They deliberate the main integrations for NgRx with Angular, various implementation strategies, and more. This is an exciting conversation you won’t want to miss! In this Episode… NgRx overview NgRx best practices NgRx an…
 
In this episode, about what we can all learn from the experience of being a neurodivergent developer, with Alex Karp, author of the new book Running Start: How to get a job in tech, keep that job, and thrive. Alex talks about some of the biggest misconceptions about autism, how putting effort into accessibility and inclusion helps everyone, and wha…
 
Interpol coordinates international enforcement action against scammers. A new version of IceXLoader is observed. Exploiting versioning limits to render files inaccessible. Reflections on the first large-scale hybrid war. Kelly Shortridge from Fastly on why behavioral science and economics matters for InfoSec. Patrick Orzechowski from DeepWatch on R…
 
This week I discuss the California CCW leak, release the latest issue of UNREDACTED Magazine, and answer several listeners' Linux questions.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be…
 
This week, Dan Neumann is joined by Agile’s Thought Chief Architect, Michael Cooper to explore the topic of Technical Debt. In this episode, Dan and Mike share how Technical Debt has become a dirty term among technical and non-technical people, where it can be considered to be a waste of time and money. Mike is here to demystify Tech Debt and talk …
 
Build automation tools automate the process of building code, including steps such as compiling, packaging binary code, and running automated tests. Because of this, build automation tools are considered a key part of a continuous delivery pipeline. Build automation tools read build scripts to define how they should perform a build. Common build sc…
 
A new sophisticated malware is attacking SOHO routers New study shows over half of employees use prohibited apps Google battles bots, puts Workspace admins on alert Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to …
 
Case Study: Cobalt Strike Server Lives on After its Domain is Suspended https://isc.sans.edu/forums/diary/Case+Study+Cobalt+Strike+Server+Lives+on+After+Its+Domain+Is+Suspended/28804/ CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus https://www.horizon3.ai/red-team-blog-cve-2022-28219/ CWE Top 25 Update …
 
CISA, the FBI, the Department of the Treasury, and the Financial Crimes Enforcement Network are releasing this alert to provide information on MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors predominantly rely on vulnerabilities in Remote Desktop Protocol to access victims’ networks. AA22-181A Alert, Technical Details…
 
On June 30, the U.S. Supreme Court issued a ruling that will have far reaching consequences about the power of the federal government to fight climate change. How did the landmark ruling even end up in front of the Justices, why did they decide to rule on it, and what will the consequences be for the environment and the country? On this episode of …
 
Killnet hits Norwegian websites. Hacktivists are tied to Russia's government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea Little Limbago from Interos examines borderless data. Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of…
 
Charles Max Wood is the master architect behind Top End Devs, which includes 11 unique podcast shows for DevOps. Today on the show, Subrat interviews Charles on how to launch, grow, and monetize a podcast show from scratch. He shares his process, the strategies to launch, various tools, sites, and apps, how to build an audience, and how to monetize…
 
Creating great creative tools is extremely difficult. There are thousands of paths a user could take, and every aspect of the user experience has to be carefully considered and optimized for performance. And when you try to add real-time collaboration on top of that, you can be sure that you’re left with almost no time to focus on the core user exp…
 
NATO to create rapid response cyber force FBI warns of deep fakes for remote work Ship controls identified as another major attack surface Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to comb through the D&R clutt…
 
Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe and Dave have some listener follow up from the 200th episode discussing how many redirects are too many. Joe has two stories this week, the first on how…
 
Most technology companies rely on open source software projects. But open source software projects are often maintained by a group of people that is not affiliated with any particular company. When an open source project develops too much technical debt, it can become a tragedy of the commons. Who is responsible for maintaining these open source pr…
 
Its New Phone Day: Time to Migrate Your MFA https://isc.sans.edu/forums/diary/Its+New+Phone+Day+Time+to+migrate+your+MFA/28800/ Managing Human Risk Security Awareness Report https://go.sans.org/lp-wp-2022-sans-security-awareness-report Microsoft Azure Service Fabric Container Elevation of Privilege Vulnerability https://unit42.paloaltonetworks.com/…
 
NATO's response to Killnet's cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active in the wild. RansomHouse hits AMD. CISA releases six ICS security advisories. The most dangerous software weaknesses. Betsy Carmelite from Booz Allen Hamilton takes a look …
 
Karl Wiegers, Principal Consultant with Process Impact and author of 13 books, discusses specific practices based on his 50 years’ experience in the software industry that can help and affect many software projects. Host Gavin Henry spoke with Wiegers about common problems in software development, including technical debt; staff scaling; iron trian…
 
We welcome Adam Argyle back onto the pod as we discuss his latest talk from Google I/O 2022, “The State of CSS in 2022.” We talk browser compatibility, cascade layers, color, and so much more. Links https://www.linkedin.com/in/adamargyle/ https://twitter.com/argyleink https://github.com/argyleink https://nerdy.dev/ https://www.youtube.com/channel/U…
 
#165: Viktor recently (sort of) attended KubeCon EU 2022 in Valencia, Spain. In this episode, we talk about everything that Viktor saw and experienced. We also attempt to answer the age old question, how was the conference food? YouTube channel: https://youtube.com/devopsparadox/ Books and Courses: Catalog, Patterns, And Blueprints https://www.devo…
 
In this episode of Syntax, Wes and Scott talk about their tips for better communication in email, Zoom calls, code reviews, or asking for help. Sentry - Sponsor If you want to know what’s happening with your code, track errors and monitor performance with Sentry. Sentry’s Application Monitoring platform helps developers see performance issues, fix …
 
This episode reports on the updating of two important vulnerabilities list, a warning to Kubernetes administrators, a U.S. regulator punishes the current and former owners of a website for a data breach and SOHO routers being targetedBy ITWC
 
Stolen PII and deepfakes used to apply for tech jobs Russia fines foreign firms for data violations Premier League crypto sponsorships expose fans to big losses Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to comb…
 
Possible Scans for HiByMusic Devices https://isc.sans.edu/forums/diary/Possible+Scans+for+HiByMusic+Devices/28796/ OpenSSL Heap Overflow https://guidovranken.com/2022/06/27/notes-on-openssl-remote-memory-corruption/ https://github.com/openssl/openssl/issues/18625#issuecomment-1165012549 ZuoRat MalwareHijacking Home Office Routers https://blog.lumen…
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: Activists who are totally not Israeli military hackers make Iranian steel mills firebally Chinese APT crews use ransomware to muddy attribution Attackers are now ransoming cloud access Chinese APTs using building control systems for persistence and stealt…
 
Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing T…
 
Distributed denial-of-service attacks against Lithuania. Dark Crystal RAT described. Iranian steel mill suspends production due to cyberattack. Bumblebee rising. CISA adds to its Known Exploited Vulnerabilities Catalog. Music pirate sites brought down by US and Brazilian authorities. Joe Carrigan looks at Apple’s private access tokens. Mister Secur…
 
The Supreme Court has overturned Roe v. Wade, upsetting decades of precedent and ushering in a weird new world of conflicting laws and a lack of bodily autonomy for many women in the country. It’s a decision that will affect life in the U.S. in ways we’re only starting to comprehend. This week on Cyber we’re going to look at one small piece of all …
 
It’s that time again on the Congressional calendar. All the big, bipartisan tech initiatives that looked so good a few months ago are beginning to compete for time on the floor like fat men desperate to get through a small door. And tech lobbyists are doing their best to hinder the bills they hate while advancing those they like. We open the Cyberl…
 
We talk to Greg Brimble, Systems Engineer at Cloudflare, about his talk from this year’s Remix Conf, “Full Stack Fast: Data on the Edge.” He covers what the Edge is, how Cloudflare fits into Edge computing, and more. Links https://discord.gg/cloudflaredev https://twitter.com/gregbrimble What is Jamstack? Follow us. Get free stickers. Follow us on A…
 
All frameworks have their quirks. As a framework matures some of the quirks go away but every framework seems to have one or two things that you have to work around. When writing demo or proof of concept code you may not run into these quirks. They only surface when you need to deploy your code in another environment. In this episode the panelists …
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login