Technical interviews about software topics.
Become the best software developer you can be
Machine learning and data science episodes of Software Engineering Daily.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Technical interviews about software topics.
Databases and data engineering episodes of Software Engineering Daily
Technical interviews about software topics.
Hosts Azam Abdulkadir, Ben Koch, and Collin Cierlak, software / data engineers at the computer vision company GumGum, discuss topics from prominent software engineering publications and explain how they can be applied to your daily workflow.
Studies show that people in “maker” professions such as developers and writers are most productive when they can carve out dedicated time for focused work, without the frequent context-switching that comes with an irregular meeting schedule. Meetings and other non-development work are necessary parts of the job, but a team will be much more product…
S
Software Engineering Daily


1
Synthetic Data with Ian Coe, Andrew Colombi, and Adam Kamor
47:15
47:15
Play later
Play later
Lists
Like
Liked
47:15
Over the past few years, the conventional wisdom around the value proposition of Big Data has begun to shift. While the prevailing attitude towards Big Data may once have been “bigger is better,” many organizations today recognize that broad-scale data collection comes with its own set of risks. Data privacy is becoming a hotly debated topic both i…
S
Software Engineering Daily


1
Semgrep: Modern Static Analysis with Isaac Evans
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40
Static analysis is a type of debugging that identifies defects without running the code. Static analysis tools can be especially useful for enforcing security policies by analyzing code for security vulnerabilities early in the development process, allowing teams to rapidly address potential issues and conform to best practices. R2C has developed a…
P
Podcast – Software Engineering Daily


1
Semgrep: Modern Static Analysis with Isaac Evans
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40
Static analysis is a type of debugging that identifies defects without running the code. Static analysis tools can be especially useful for enforcing security policies by analyzing code for security vulnerabilities early in the development process, allowing teams to rapidly address potential issues and conform to best practices. R2C has developed a…
S
Software Daily


1
Semgrep: Modern Static Analysis with Isaac Evans
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09
Static analysis is a type of debugging that identifies defects without running the code. Static analysis tools can be especially useful for enforcing security policies by analyzing code for security vulnerabilities early in the development process, allowing teams to rapidly address potential issues and conform to best practices. R2C has developed a…
T
The CyberWire Daily


1
PLA spyware keeps Tibetans under surveillance. Cyber conflict between Ukraine and Russia, some conventionally criminal, other state-directed. US Executive Order addresses supply chain resilience.
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38
FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as…
S
Software Engineering Daily


1
Multi-Prem Software Delivery and Management with Grant Miller
55:20
55:20
Play later
Play later
Lists
Like
Liked
55:20
Modern SaaS products are increasingly delivered via the cloud, rather than as downloadable, executable programs. However, many potential users of those SaaS products may need that software deployed on-prem, in a private network. Organizations have a variety of reasons for preferring on-prem software, such as security, integration with private tools…
P
Podcast – Software Engineering Daily


1
Multi-Prem Software Delivery and Management with Grant Miller
55:20
55:20
Play later
Play later
Lists
Like
Liked
55:20
Modern SaaS products are increasingly delivered via the cloud, rather than as downloadable, executable programs. However, many potential users of those SaaS products may need that software deployed on-prem, in a private network. Organizations have a variety of reasons for preferring on-prem software, such as security, integration with private tools…
S
Software Daily


1
Multi-Prem Software Delivery and Management with Grant Miller
53:41
53:41
Play later
Play later
Lists
Like
Liked
53:41
Modern SaaS products are increasingly delivered via the cloud, rather than as downloadable, executable programs. However, many potential users of those SaaS products may need that software deployed on-prem, in a private network. Organizations have a variety of reasons for preferring on-prem software, such as security, integration with private tools…
S
Software Engineering Daily


1
Digital Ocean Platform with Cody Baker and Apurva Joshi
55:27
55:27
Play later
Play later
Lists
Like
Liked
55:27
Cloud platforms are often categorized as providing either Infrastructure-as-a-Service or Platform-as-a-Service. On one side of the spectrum are IaaS giants such as AWS, which provide a broad range of services for building infrastructure. On the other are PaaS providers such as Heroku and Netlify which abstract away the lower-level choices and focus…
P
Podcast – Software Engineering Daily


1
Digital Ocean Platform with Cody Baker and Apurva Joshi
55:27
55:27
Play later
Play later
Lists
Like
Liked
55:27
Cloud platforms are often categorized as providing either Infrastructure-as-a-Service or Platform-as-a-Service. On one side of the spectrum are IaaS giants such as AWS, which provide a broad range of services for building infrastructure. On the other are PaaS providers such as Heroku and Netlify which abstract away the lower-level choices and focus…
S
Software Daily


1
Digital Ocean Platform with Cody Baker and Apurva Joshi
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20
Cloud platforms are often categorized as providing either Infrastructure-as-a-Service or Platform-as-a-Service. On one side of the spectrum are IaaS giants such as AWS, which provide a broad range of services for building infrastructure. On the other are PaaS providers such as Heroku and Netlify which abstract away the lower-level choices and focus…
T
The CyberWire Daily


1
Accellion FTA compromise spreads. Ocean Lotus is back. LazyScripter seems to represent a new threat group. Notes from the SolarWinds hearings. New ICS threat actors.
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
T
The CyberWire Daily


1
DDoS in hybrid war. Accellion compromise attributed. Initial access brokers. Agile C2 for botnets. US Senate’s SolarWinds hearing. US DHS cyber strategy. Shiny new phishbait.
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
Yelp.com is a crowdsourced review platform focused on restaurants and local businesses. Originally created as an email-based recommendation service, Yelp re-launched in its modern form in 2005. At the time, its focus on user-created reviews and social interactions was fairly novel, and made it stand out from competitors such as Angie’s List and Cit…
Yelp.com is a crowdsourced review platform focused on restaurants and local businesses. Originally created as an email-based recommendation service, Yelp re-launched in its modern form in 2005. At the time, its focus on user-created reviews and social interactions was fairly novel, and made it stand out from competitors such as Angie’s List and Cit…
Yelp.com is a crowdsourced review platform focused on restaurants and local businesses. Originally created as an email-based recommendation service, Yelp re-launched in its modern form in 2005. At the time, its focus on user-created reviews and social interactions was fairly novel, and made it stand out from competitors such as Angie’s List and Cit…
T
The CyberWire Daily


1
Facebook takes down Myanmar military page. Chinese cyberespionage and cloned Equation Group tools. Supply chain compromises. Threat trends.
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…
Studies show that people in “maker” professions such as developers and writers are most productive when they can carve out dedicated time for focused work, without the frequent context-switching that comes with an irregular meeting schedule. Meetings and other non-development work are necessary parts of the job, but a team will be much more product…
Studies show that people in “maker” professions such as developers and writers are most productive when they can carve out dedicated time for focused work, without the frequent context-switching that comes with an irregular meeting schedule. Meetings and other non-development work are necessary parts of the job, but a team will be much more product…
Studies show that people in “maker” professions such as developers and writers are most productive when they can carve out dedicated time for focused work, without the frequent context-switching that comes with an irregular meeting schedule. Meetings and other non-development work are necessary parts of the job, but a team will be much more product…
T
The CyberWire Daily


1
Billy Wilson: Translating language skills to technical skills. [HPC] [Career Notes]
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37
High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursui…
T
The CyberWire Daily


1
Attackers (ab)using Google Chrome. [Research Saturday]
20:47
20:47
Play later
Play later
Lists
Like
Liked
20:47
Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)u…
T
The CyberWire Daily


1
Mopping up Solorigate. Tehran’s Lightning and Thunder in Amsterdam. The view from Talinn. Malware designed for Apple’s new chips. Lessons from the ice, and how hackers broke bad.
25:37
25:37
Play later
Play later
Lists
Like
Liked
25:37
Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence report describes Russian and Chinese ambitions in cyberspace. Threat …
S
Software Daily


1
Equinix Partnerships with Shaedon Blackman
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58
A “co-location” center is a data center that leases out networking and compute infrastructure to retail clients. Co-location centers host clients with a wide variety of infrastructure strategies, from small retail customers, to medium-size teams running hybrid cloud models, to large corporate clients who prefer not to incur the capital cost of buil…
S
Software Engineering Daily


1
Equinix Partnerships with Shaedon Blackman
46:05
46:05
Play later
Play later
Lists
Like
Liked
46:05
A “co-location” center is a data center that leases out networking and compute infrastructure to retail clients. Co-location centers host clients with a wide variety of infrastructure strategies, from small retail customers, to medium-size teams running hybrid cloud models, to large corporate clients who prefer not to incur the capital cost of buil…
P
Podcast – Software Engineering Daily


1
Equinix Partnerships with Shaedon Blackman
46:05
46:05
Play later
Play later
Lists
Like
Liked
46:05
A “co-location” center is a data center that leases out networking and compute infrastructure to retail clients. Co-location centers host clients with a wide variety of infrastructure strategies, from small retail customers, to medium-size teams running hybrid cloud models, to large corporate clients who prefer not to incur the capital cost of buil…
D
Data – Software Engineering Daily


1
Equinix Partnerships with Shaedon Blackman
46:05
46:05
Play later
Play later
Lists
Like
Liked
46:05
A “co-location” center is a data center that leases out networking and compute infrastructure to retail clients. Co-location centers host clients with a wide variety of infrastructure strategies, from small retail customers, to medium-size teams running hybrid cloud models, to large corporate clients who prefer not to incur the capital cost of buil…
T
The CyberWire Daily


1
The WatchDog Monero cryptojacking operation. “A criminal syndicate with a flag.” US Senator asks FBI, EPA for a report on water system cybersecurity. Cybercrooks placed on notice.
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53
Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident…
S
Software Engineering Daily


1
Augur: Ethereum Prediction Markets with Joey Krug
52:12
52:12
Play later
Play later
Lists
Like
Liked
52:12
Prediction Markets provide an exchange for trading based on the outcome of events. Most prediction markets are centralized- they operate like a casino, where betting takes place under the supervision of one central governing organization. This makes the market less efficient than it otherwise might be: the central organization is a business, and it…
P
Podcast – Software Engineering Daily


1
Augur: Ethereum Prediction Markets with Joey Krug
52:12
52:12
Play later
Play later
Lists
Like
Liked
52:12
Prediction Markets provide an exchange for trading based on the outcome of events. Most prediction markets are centralized- they operate like a casino, where betting takes place under the supervision of one central governing organization. This makes the market less efficient than it otherwise might be: the central organization is a business, and it…
S
Software Daily


1
Augur: Ethereum Prediction Markets with Joey Krug
49:35
49:35
Play later
Play later
Lists
Like
Liked
49:35
Prediction Markets provide an exchange for trading based on the outcome of events. Most prediction markets are centralized- they operate like a casino, where betting takes place under the supervision of one central governing organization. This makes the market less efficient than it otherwise might be: the central organization is a business, and it…
T
The CyberWire Daily


1
US warns of DPRK threat to cryptocurrency holders, and indicts four on conspiracy charges. Centreon says Sandworm affected unsupported open-source tools. Big Hack skepticism. Patch notes.
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42
High Bitcoin valuation draws the attention of cybercriminals, and a number of those criminals work for Mr. Kim, of Pyongyang. Alleged criminals, we should say. Centreon offers an update of its investigation of the Sandworm incident ANSSI uncovered. Reports of the Big Hack are received with caution. Patches applied, pulled, and replaced. Joe Carriga…
In the past several years, Kubernetes has become the de-facto standard for orchestrating containerized, stateless applications. Tools such as StatefulSets and Persistent Volumes have helped developers build stateful applications on Kubernetes, but this can quickly become difficult to manage as an application scales. Tasks such as machine learning, …
In the past several years, Kubernetes has become the de-facto standard for orchestrating containerized, stateless applications. Tools such as StatefulSets and Persistent Volumes have helped developers build stateful applications on Kubernetes, but this can quickly become difficult to manage as an application scales. Tasks such as machine learning, …