Development public
[search 0]
×
Best Development podcasts we could find (updated August 2020)
Best Development podcasts we could find
Updated August 2020
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and developer at @Clearbit. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: developertea ...
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
Conversations with the hackers, leaders, and innovators of software development. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Sara Chipps, Paul Ford, and Ben Popper, the series will feature questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. About Stack Overflow Founded in 2008, Stack Overflow is the largest, most trusted online community for developers to learn, share their knowledge, and buil ...
 
devMode.fm is a bi-weekly podcast dedicated to the tools, techniques, and technologies used in modern web development. Each episode, we have a cadre of hosts discussing the latest hotness, pet peeves, and technologies we use every day. We all come from a Craft CMS background, but we’ll be focusing on other cool frontend development technologies as well.
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
 
We're Emma Bostian, Kelly Vaughn, and Ali Spittel - three seasoned software developers working in different sectors. Since there's a major lack of technical podcasts out there, we've decided to start one. Just kidding -- there's already a ton! But, we wanted to add our voices to the space and share our experiences and advice. We'll have great discussions around how to start coding, the hot technologies right now, how to get your first developer job, and more!
 
Loading …
show series
 
Around the globe, tens of millions of students are using Codecademy to learn programming during the pandemic. Just ask MLB pitcher Jared Hughes who learned Python to analyze his performance. This episode, we talk with Zach Sims, co-founder of Codecademy, all about the shifting job market and how people are going online to learn how to code. Early i…
 
In today's episode, we're talking about the limits of our brain and mind shifting strategies to solve problems faster. 📮 Ask a Question If you enjoyed this episode and would like me to discuss a question that you have on the show, drop it over at: developertea.com. 🧡 Leave a Review If you're enjoying the show and want to support the content head ov…
 
Rob is a speaker, author, and consultant. As owner of Thor Projects, a premiere consulting organization in Indianapolis (Indiana), he helps clients make the complicated simple. Links https://twitter.com/RobBogue https://www.linkedin.com/in/robertlbogue/ https://mvp.microsoft.com/en-us/PublicProfile/9984 https://app.pluralsight.com/profile/author/ro…
 
In this Hasty Treat, Scott and Wes talk about their experience upgrading Syntax.fm and some of the site’s big changes. LogRocket - Sponsor LogRocket lets you replay what users do on your site, helping you reproduce bugs and fix issues faster. It’s an exception tracker, a session re-player and a performance monitor. Get 14 days free at logrocket.com…
 
On this episode, we have Sam Hernandez from Precocity LLC on to talk to us about how the centuries old philosophy of Stocism applies to development, and to our lives. Stocism is a philosophy designed to make us more resilient, happier, more virtuous and more wise–and as a result, better people, better parents and better professionals. Sam talks to …
 
Document databases are becoming increasingly common. Not only do they offer a lot of advantages over relational databases in certain contexts, but they also greatly reduce the friction of working with data when using object-oriented languages. Not only do these advantages often make it easier to work with your data, but they can make it easier to r…
 
With barely enough income to support his wife and child, not to mention a poor working environment for his physical and mental health, Michael Pimentel wanted to move on from being a glassblower. That’s why after 9 years in the film industry, Michael decided to pursue a career in tech by using free online resources to teach himself how to code. If …
 
President Trump says he authorized US Cyber Command’s retaliation against Russia’s Internet Research Agency for midterm election meddling. North Korean financially motivated hacking as a sign of internal power dynamics. TrickBot accidentally deploys a new module. TikTok, privacy, and security. LinkedIn hacker convicted. Justin Harvey from Accenture…
 
A Reminder to Patch CVE-2020-3452. Active Exploitation Seen https://isc.sans.edu/forums/diary/Reminder+Patch+Cisco+ASA+FTD+Devices+CVE20203452+Exploitation+Continues/26426/ Internet Choke Points: Concentration of Authoritative Name Servers https://isc.sans.edu/forums/diary/Internet+Choke+Points+Concentration+of+Authoritative+Name+Servers/26428/ Aug…
 
This week, it's Security Weekly Virtual Hacker Summer Camp 2020! In our first segment, we welcome Mike Rothman, President at DisruptOps, to discuss: How Does Sec Live In A DevOps World? In the Application Security News, Using Amazon GuardDuty to Protect Your S3, OkCupid Security Flaw Threatens Intimate Dater Details, Florida teen charged as masterm…
 
The US attributes the Taidoor remote access Trojan to the Chinese government. Sources tell Reuters that documents used in an attempt to influence the last British general election were taken from the compromised email account of the trade minister. Pegasus spyware is found deployed against churchmen and political opposition figures in Togo. China d…
 
This week, we welcome back Corey Thuen, Co-Founder at Gravwell, to talk about Gravwell's Big Bang Release! In our second segment, we welcome Siddharth Bhatia, PhD student at National University of Singapore, to discuss MIDAS: Siddharth's Research that finds anomalies or malicious entities in real-time! In the Security News, a Vulnerability that All…
 
In this episode, we’re going into the depths of North Korea to conduct one of the greatest hacks of all time. To find a way to inject information into a country run by totalitarian regime. A big thanks to Yeonmi Park for sharing her story with us. Also thanks to Alex Gladstein for telling us the inside story. You can find more about Flash Drive For…
 
No list of great hacks would be complete without the Samy worm that ran amok on Myspace back in 2005. As Rachel points out, lots of hackers start out as experimenters, naturally curious coders who enjoy learning the rules and seeing how far they will bend before they break. If any hack made it's way into the mainstream consciousness over the last d…
 
VBA Macro With Multiple Command and Control Channels https://isc.sans.edu/forums/diary/Powershell+Bot+with+Multiple+C2+Protocols/26420/ Boothole Patch Causes Unbootable Systems https://access.redhat.com/solutions/5272311 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass#Recovery Disabling MacOS TCC https://objective-see.com/b…
 
Microsoft is in talks to acquire TikTok as the US hints that it may be considering action against other Chinese software companies. Three young men have been charged in the Twitter hack. An apparent distributed denial-of-service attack turns out to have been a glitch. We welcome Verizon’s Chris Novak to the show. Rick Howard talks incident response…
 
In this episode, Dave and Jamison answer these questions: Questions I’m in the process of quitting my job. I’ve been a developer here for a few years and made amazing friends. I love the people here but I am looking for a new challenge and a pay increase. I was discussing my references for the new role with my partner and she said I should ask my c…
 
Show Description **************** We riff on web components and web component libraries, when and why you should use a framework vs vanilla HTML/CSS/JS, how to make phone numbers more accessible, trying to figure out state, and some thoughts on SVG memory usage. Listen on Website → Links ***** A bit on Web Component Libraries Ionic Shoelace Stencil…
 
Pages Hit By Bad Bots https://isc.sans.edu/forums/diary/What+pages+do+bad+bots+look+for/26414/ KeePassRPC Vulnerablity https://forum.kee.pm/t/a-critical-security-update-for-keepassrpc-is-available/3040 QNAP Updates Malware Remover https://www.bleepingcomputer.com/news/security/qnap-urges-users-to-update-malware-remover-after-qsnatch-alert/ Android …
 
It’s all about telemetry and feedback as we continue learning from The DevOps Handbook, while Joe knows his versions, Michael might have gone crazy if he didn’t find it, and Allen has more than enough muscles. For those that use their podcast player to read these show notes, did you know that you can find them at https://www.codingblocks.net/episod…
 
Ran & Israel Barak, Cybereason’s CISO, discuss the latest development in ransomware evolution: multi-stage attacks in which the attackers infiltrate the target network, steal data and gather intelligence – before detonating the ransomware to cause maximal denial-of-service to the victim organization. What does this new tactic mean for the use of ba…
 
When, if ever, should you, should make changes to your product’s code that don’t change its external behaviour? How do you weigh up the risks of breaking things against the ease of future development? Steve and Ed get way more technical than usual in this episode. We want listener questions! Post your question here and we’ll discuss it in a future …
 
Director of Security Engineering at Marketa and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chri…
 
EPISODE 181-B-Four More Minutes Please...This supplement to yesterday's episode provides an important correction to last week's contact show.Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.Listen to ALL episodes at https://inteltechniques.com/p…
 
NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19. Jo…
 
Kayla Cinnamon, Program Manager at Microsoft for Windows Terminal, Console, Command Line, and Cascadia Code joined us to talk about the release of Windows Terminal 1.0 and the new Windows command-line experience. We talk about everything that went into rethinking the command line experience on Windows, the UX and UI design behind it all, the learni…
 
This week, 'Boothole' vulnerability basically affects everything, Garmin Pays Ransomware but the implications are scary, Doki, Fancy Bear, GRU, Fancy Bear is hitting lots of US targets in an escalating campaign ,and someone who does like Assange doesn't like Idaho very much! Show Notes: https://wiki.securityweekly.com/swn54 Visit https://www.securi…
 
An update on social engineering at Twitter. A quick look at the phishing kit criminal market. The European Union sanctions individuals and organizations in Russia, China, and North Korea for involvement in notorious hacking campaigns. North Korea’s North Star campaign is back and dangling bogus job offers in front of its marks. Deceptikons snoop in…
 
EPISODE 181- Four Updates in Ten MinutesThis week I briefly present a few privacy updates.Support for this show comes directly from my new book Extreme Privacy-Second Edition. More details can be found at https://inteltechniques.com/books.html.Listen to ALL episodes at https://inteltechniques.com/podcast.htmlSHOW NOTES:INTRO:NoneFOUR UPDATES IN TEN…
 
[00:03:02] Jason and Chris chat about moving, selling, and designing their new homes. Chris has gone down a rabbit hole lately and tells us to check out a Matt Risinger, a builder in Texas, on YouTube. [00:11:20] Jason talks about using Stripe's hosted billing stuff and it was a dream come true. Chris brings up Paddle and wanting to try it. [00:21:…
 
Logs are the source of truth. If a company is sufficiently instrumented, the logging data that streams off of the internal infrastructure can be refined to tell a comprehensive story for what is changing across that infrastructure in real time. This includes logins, permissions changes, other events that could signal a potential security compromise…
 
The week we discuss New Relic’s open source plans, why monitoring is so complicated and try to unravel the mystery of enterprise pricing. Plus, Coté finds out that you can indeed use too much soap. The Rundown Friend us and follow SDT on Twitch: sdtpodcat New Relic Changes Business Model, Open Sources Agents and Instrumentation Analysts Estimate Ne…
 
Python Developers: Prepare! https://isc.sans.edu/forums/diary/Python+Developers+Prepare/26408/ Office 365 Phishing Hiding in Google Ads https://cofense.com/threat-actors-bypass-gateways-google-ad-redirects/ Zoom Brute Forcing Vulnerability https://www.tomanthony.co.uk/blog/zoom-security-exploit-crack-private-meeting-passwords/ Netgear Vulnerabiliti…
 
With the rising cost of data breaches, executives need to understand the basics of cybersecurity so they can make strategic decisions that keep companies out of headlines and legal battles. Teri Radichel is the CEO of 2nd Sight Lab and the author of the new book "Cybersecurity for Executives in the Age of Cloud." She teaches Scott about what folks …
 
Yesterday’s antitrust hearings in the US House of Representatives focus on Big Tech’s big data as something open to use in restraint of trade. And there are questions about community standards as well. The BootHole vulnerability may not represent an emergency, but it will be tough to fix. Android malware masquerades as COVID-19 contact-tracers. The…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login