show episodes
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The CodeNewbie podcast was born from CodeNewbie, an organization which fosters a supportive, international community of people learning to code. Each season, host Saron Yitbarek delivers stories and interviews from people of diverse backgrounds and expertise about their coding journeys, as well as beginner friendly discussions about the tech you should know about.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
H
Hacked

1
Hacked

Sticks & Stones

Unsubscribe
Unsubscribe
Monthly
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
 
S
Self-Hosted

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is an informal podcast inspired by Magic Read Along. We plan to talk about whatever we feel like - algorithms, data structures, programming languages, latest news in tech and more. Feel free to follow us on Twitter at @adspthepodcast.
 
Loading …
show series
 
If you want to dive deeper on lucrative skills, you can read a blog post Mike wrote for us last month. If you want to learn more about Mike's background and career, check out his LinkedIn. Mike was previously on the blog and podcast discussing Skillsoft research about the certifications that are most in demand for top paying roles. You can read up …
 
We’re listening! This week’s experimental, super-brief Monday edition of “The Changelog” has the following new features: It’s longer, there’s no background music during the stories, and it includes stories previously not featured in the newsletter. If you like this better than the last one, would listen to it, and want us to keep it going… let us k…
 
This episode is sponsored by Tonic.ai – where your data is modeled from your production data to help you tell an identical story in your testing environments. [00:01 - 05:08] Opening Segment Need to generate fake data that looks, acts, and behaves like production data for your test environments? Check out Tonic.ai! Head over to https://www.tonic.ai…
 
WebAssembly is awesome - what else can you do with it? While at NDC London, Carl and Richard talked to Steve Sanderson about his work with WebAssembly, including Blazor. Steve talks about how WebAssembly continues to evolve adding WebAssembly System Integration. This opens the door to the idea that code in the WebAssembly can be run anywhere - any …
 
How Many SANs are Insane https://isc.sans.edu/forums/diary/How+Many+SANs+are+Insane/28820/ Fortinet July Updates https://fortiguard.fortinet.com/psirt?date=07-2022 Phishing Attacks Getting Trickier https://www.sans.org/newsletters/ouch/phishing-attacks-getting-trickier Quantum Safe Ciphers https://csrc.nist.gov/News/2022/pqc-candidates-to-be-standa…
 
The FBI, CISA, and the Department of the Treasury are releasing this joint Cybersecurity Advisory to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health Sector organizations. AA22-187A Alert, Technical Details, and Mitigations Stairwe…
 
Kumar Ramaiyer, CTO of the Planning Business Unit at Workday, discusses the infrastructure services needed and the design and lifecycle of supporting a software-as-a-service (SaaS) application. Host Kanchan Shringi spoke with Ramaiyer about composing a cloud application from microservices, as well as key checklist items for choosing the platform se…
 
You can’t scroll 1 inch on the internet these days without someone trying to sell you something. Facebook and Google rake in millions of dollars on advertising alone. When we talk about Ad Tech, those are the names that move through our mind. Not many people think about Disney. But they should. On today’s Cyber, Motherboard staff writer Joseph Cox …
 
Quantum computing and security standards. Notes on the cyber phases of a hybrid war, and how depressingly conventional cybercrime persists in wartime. Pyongyang operators are using Maui ransomware against healthcare targets. Malek Ben Salem from Accenture looks at the security risks of GPS. Our guest is Brian Kenyon of Island to discuss enterprise …
 
In this episode, we talk about Lexical, the new extensible text editor framework from Meta, with Elena Bukareva, software engineering manager at Meta, and Acy Watson, software engineer for the Lexical core team. Links https://www.linkedin.com/in/elena-bukareva/ https://www.linkedin.com/in/acy-watson-3150a34b/ https://github.com/acywatson https://tw…
 
#166: In-person events are starting to ramp back up. However, there are plenty of online conferences. Worse yet, some companies are still trying to do hybrid events. In this episode, we dig into what makes for a bad online experience and some different ways that event organizers should consider to make the experience better for attendees. Robin’s b…
 
In this episode of Syntax, Wes and Scott talk about their experiences speaking at conferences, why they’ve done it, how they prepare talks, and tips for anyone interested in wanting to give talks. Linode - Sponsor Whether you’re working on a personal project or managing enterprise infrastructure, you deserve simple, affordable, and accessible cloud…
 
Enterprise-grade authentication is often an essential ingredient to virtually all applications in today’s world. However, companies often have a hard time understanding the value of that authentication especially during the early stages of product development. And hardening of an application is often left as an afterthought. Add enterprise-level re…
 
Hacker may have stolen personal data of 1 billion Chinese citizens Ukrainian police take down phishing gang behind payments scam NIST unveils ‘quantum-proof’ cryptography algorithms Thanks to today’s episode sponsor, Votiro Can you trust that your content and data is free of malware and ransomware? With Votiro you can. Votiro removes evasive and un…
 
Picture of the week. Chrome's fourth zero-day of 2022. Mozilla's new Firefox privacy-enhancing feature. HackerOne discloses a malicious insider incident. Closing the loop. The ZuoRAT. We invite you to read our show notes at https://www.grc.com/sn/SN-878-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit…
 
EternalBlue 5 Years After WannaCry and NotPetya https://isc.sans.edu/forums/diary/EternalBlue+5+years+after+WannaCry+and+NotPetya/28816/ OpenSSL Patches Two Vulnerabilities https://www.openssl.org/news/secadv/20220705.txt Iconburst NPM Software Supply Chain Attack https://blog.reversinglabs.com/blog/iconburst-npm-software-supply-chain-attack-grabs-…
 
On this week’s show Patrick Gray and guest cohost Mark Piper discuss the week’s security news, including: A billion records leaked in China China to develop desktop operating system HackerOne fires insider for stealing hackers’ work and bounties FSB officer charged with stealing hacker’s bitcoin Why Microsoft is wrong on Russia and Ukraine Much, mu…
 
Cyberattack hits a Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Royal Army accounts are hijacked. A hacktivist group claims to have hit Iranian sites. A very very large database of PII is for sale on the dark web. Chase Snyder from ExtraHop has a look back at WannaCry, 5 years on. Ben Yel…
 
Originally published on April 6, 2022 We are taking some time off from production. We will be back with new episodes on July 6th. Chantastic joins us to talk about Chromatic, component-driven development, testing, Spider-Man, and more. Links https://twitter.com/chantastic https://storybook.js.org https://www.chromatic.com https://www.youtube.com/St…
 
I recently got an email from Jeff Shrager, who said he'd been working hard to solve a mystery about some famous code. Eliza, the chatbot, was built in 1964, and she didn't answer questions like Alexa or Siri. She asked questions. She was a therapist chatbot and quickly became famous after being described in a 1964 paper. But here is the mystery. We…
 
All links and images for this episode can be found on CISO Series Should you monitor your staff? I mean reallymonitor them. Some bosses are installing screen grabbing and click tracking software to monitor employees and by most estimates employees hate it so much that half of them would quit if their supervisors installed monitoring software on the…
 
Class Diagrams are a very great way to document your system, inspect and understand the relationships between the classes and plan refactorings and disseminate knowledge inside the team. In this episode, Edson Moisinho discusses using PlantUML - an open-source tool that allows generating many types of UML diagrams from plain text. Sponsors Top End …
 
Jenkins discloses dozens of zero-day bugs in multiple plugins Rogue HackerOne employee steals bug reports to sell on the side Patchable and preventable security issues lead causes of Q1 attacks Thanks to today’s episode sponsor, Votiro Can you trust that your content and data is free of malware and ransomware? With Votiro you can. Votiro removes ev…
 
Episode notes An interesting podcast episode on the multiple delays that have kept Ethereum from its long-anticipated merge and kicked the difficulty bomb down the road. Since we recorded, more news broke about delaying the boom. How to Find Open Source Projects to Contribute https://www.codetriage.com/ https://www.coss.community/ https://goodfirst…
 
7Zip Mark of the Web For Office Files https://isc.sans.edu/forums/diary/7Zip+MoW+For+Office+files/28812/ SessionManager Backdoor Seen with IIS https://securelist.com/the-sessionmanager-iis-backdoor/106868/ Googe Chrome Stable Channel Update https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_25.html…
 
We’re going back in time, or is it forward?, as we continue learning about Google’s automation evolution, while Allen doesn’t like certain beers, Joe is a Zacker, and Michael poorly assumes that UPSes work best when plugged in. The full show notes for this episode are available at https://www.codingblocks.net/episode188. Survey Says Anonymous Vote …
 
In this episode, Marc and Patrick Morley, former CEO of Carbon Black, get nostalgic as they discuss Patrick's journey of coming up through the start up scene in the 90s—from working with VCs to taking companies public—and compare it to running cyber companies today. Along with the early career experience that helped form Patrick's leadership philos…
 
In this episode, Dave and Jamison answer these questions: I’m a senior software engineer at a fast growing software startup. In the past year and a half that I’ve been with the company I’ve gone through 5 reorgs and have had 5 different managers in 4 different teams. Each time I sit down to do a 1 on 1 with a new manager they ask about my career go…
 
In this Hasty Treat, Scott and Wes talk about new CSS color functions, and tips for viewing the different options and ways of presenting color that are coming. Linode - Sponsor Whether you’re working on a personal project or managing enterprise infrastructure, you deserve simple, affordable, and accessible cloud computing solutions that allow you t…
 
Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well a…
 
An update on the DDoS attack against Norway. NATO's resolutions on cyber security. North Korea seems to be behind the Harmony cryptocurrency heist. MedusaLocker warninga. Microsoft sees improvements in a gang's technique. Google blocks underworld domains. The Israeli-Iranian conflict in cyberspace. Chris Novak from Verizon with his take on this yea…
 
Adam and Jerod are joined once again by James Long. He was on the podcast five years ago discussing the surprise success of Prettier, an opinionated code formatter that’s still in use to this day. This time around we’re going deep on Actual, his personal finance system James built as a business for over 4 years before recently opening it up and mak…
 
This week I discuss the California CCW leak, release the latest issue of UNREDACTED Magazine, and answer several listeners' Linux questions.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be…
 
Bret is joined by Rosemary Wang, a developer advocate at Hashi Corp. She recently finished a Manning book, titled Infrastructure as Code: Patterns and Practices. They discuss how infrastructure as code fits into DevOps and Gitops, and how you can get started with IaC and run over some important patterns, such as controlling versioning, IaC testing …
 
In this episode, Bryce and Conor interview special guest Tony Van Eerd! Twitter ADSP: The Podcast Conor Hoekstra Bryce Adelstein Lelbach About the Guest: Tony Van Eerd has been coding for well over 25 years, and hopefully coding well for most of that. Previously at Inscriber, Adobe, and BlackBerry, he now enables painting with light at Christie Dig…
 
Originally published on February 8, 2022 We are taking some time off from production. We will be back with new episodes on July 6th. Paige Niedringhaus, Staff Software Engineer at Blues Wireless and author of the Modernizing React Apps course, joins us to talk about keeping your React application up to date, challenges React developers are experien…
 
This week, Dan Neumann is joined by Agile’s Thought Chief Architect, Michael Cooper to explore the topic of Technical Debt. In this episode, Dan and Mike share how Technical Debt has become a dirty term among technical and non-technical people, where it can be considered to be a waste of time and money. Mike is here to demystify Tech Debt and talk …
 
In this supper club episode of Syntax, Wes and Scott talk with Shawn Wang about his thoughts on developer experience, why DX is important, and the importance of learning in public. Hasura - Sponsor With Hasura, you can get a fully managed, production-ready GraphQL API as a service to help you build modern apps faster. You can get started for free i…
 
Build automation tools automate the process of building code, including steps such as compiling, packaging binary code, and running automated tests. Because of this, build automation tools are considered a key part of a continuous delivery pipeline. Build automation tools read build scripts to define how they should perform a build. Common build sc…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login