SlatorPod is the weekly language industry podcast where we discuss the most important news and trends in translation, localization, and language technology. Brought to you by Slator.com.
…
continue reading
Tech Life discovers and explains the ways technology is changing our lives, wherever we are in the world. We meet the people with bright ideas for rethinking the way we work, learn and play, and get hands-on with the products they dream up. We hold tech giants to account for their huge power to affect our lives, and ask who wins, and who loses, in the technology transformation. Tech Life is your guide to a future being made, and remade, at lightning speed in front of our eyes.
…
continue reading
AI stocks enthusiasts, explore comprehensive insights and analysis on artificial intelligence market trends. Get the latest AI investing updates, expert commentary, and strategic investment approaches tailored for the AI industry. Uncover AI options trades and AI market forecasts designed to boost your AI investment portfolio. Join our community of forward-thinking AI investors and confidently navigate the AI revolution. Embrace the future of artificial intelligence investing.
…
continue reading
The Prosthetics and Orthotics Podcast is a deep dive into what 3D printing and Additive Manufacturing mean for prosthetics and orthotics. We’re Brent and Joris both passionate about 3D printing and Additive Manufacturing. We’re on a journey together to explore the digitization of prostheses and orthoses together. Join us! Have a question, suggestion or guest for us? Reach out. Or have a listen to the podcast here. The Prosthetic and Orthotic field is experiencing a revolution where manufactu ...
…
continue reading
*FREE Episodes Released every Monday during active seasons. Paid Brevity+ Subscribers get Early Release, Ad Free Listening and Bonus Episodes (Follow link below)** In this hit investigative podcast, Ryan Wolf investigates some of Australasia's most enduring unsolved criminal cases. Season Four On the night of 9th November 1996, Alana Cecil, who had only recently turned 16, was excited to attend the Djerriwah Bonfire Festival in the small city of Melton, just out of Melbourne in Victoria, Aus ...
…
continue reading
I don't like boxes, but I like Guns, everything else is added value.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Join award-winning journalist Miles O’Brien as he explores developments in technology, science, aviation, space and the environment. A 35-year veteran of the news business, Miles is currently an independent producer, writer, and director for PBS NewsHour, NOVA, Frontline, and the National Science Foundation. An experienced pilot himself, he also serves as aviation analyst for CNN (And he does it all with one arm).
…
continue reading
Welcome to our Podcast about firewood, trees, timber, chainsaws, axes, woodworking and everything wood related! We are Dan and Joe...the Wood Hounds! Check in each week for more discussions about EVERYTHING firewood. New episodes air Wednesdays at 5 am est.
…
continue reading
Join Chuck Buck every Monday when he welcomes RACmonitor contributing editors and special guests for the latest regulatory audit news and information from CMS, OIG and OMHA. And gain valuable context and perspective that can only be found when you’re listening to the long-running and popular Monitor Mondays. Register to attend live here: https://racmonitor.medlearn.com/racmonitor/podcasts/
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Casual conversations with founders, technologists, investors, and artists about building a brighter future, together. Welcome to our digital living room. With science, technology and entrepreneurship we can *continue* to create unfathomable leaps in quality of life. We show you how to find, apply, build, and invest in technologies to change your life and the world. When we have smart friends, we do smart things. When we do smart things, we save the world. No matter who, where, or when you ar ...
…
continue reading
Your go-to podcast where we break down the latest cryptocurrency news into easy-to-understand insights. Step into the enchanting world of 'Phoebe's Birmingham Beat,' the GenAI-powered podcast. This project is more than just a technical feat; it's a bridge between written words and the immersive world of audio storytelling. Artificial intelligence is not just a tool here. It is a co-author, editor and translator that transforms texts to make them perfect for listening. It gets rid of repetiti ...
…
continue reading
In these podcasts, we talk to thought leaders in the area of enterprise architecture and discuss how enterprise architects can deliver maximum value to the enterprise, nonprofit, or government organizations they work for. If you would like to feature on this podcast contact Will Hardison, podcast@bizzdesign.com.
…
continue reading
1
Technology Rationalization in Cybersecurity - Max Shier - BSW #355
38:42
38:42
Play later
Play later
Lists
Like
Liked
38:42
On average, CISOs manage 50-75 security products. Many of these products have either not been deployed or only partially deployed, while others overlap of products. How do CISOs effectively consolidate their products to a manageable size? Max Shier, Chief Information Security Officer at Optiv Security, joins Business Security Weekly to discuss tech…
…
continue reading
For nearly four decades, a judicial principle known as “Chevron deference” has guided the federal courts as they reviewed litigation associated with federal agencies. Chevron deference allowed legislators to leave statutes somewhat vague, assuming that an agency full of government experts would sort out the details and promulgate effective regulati…
…
continue reading
1
S4 | Episode 13 | Blood on Her Hands
1:24:51
1:24:51
Play later
Play later
Lists
Like
Liked
1:24:51
On the night of 9th November 1996, Alana Cecil, who had only recently turned 16, was excited to attend the Djerriwarrh Bonfire Festival in the small city of Melton, just out of Melbourne in Victoria, Australia. When she left home that night it would be the last time her family would ever see her alive. Sometime in the early hours of November 10th 1…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on July 20, 2017. Doug talks about how to count from zero to one! Show Notes: https://securityweekly.com/vault-swn-18
…
continue reading
1
#217 Legal Battles, Bankruptcies, Acquisitions, and AI Interpreting Guidelines
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10
Florian and Esther discuss the language industry news of the week, with a legal battle in the UK involving public sector interpreting and the classification of interpreters as freelancers or workers, which could significantly impact the business models of language service providers (LSPs). The duo explores Google Translate's recent expansion to sup…
…
continue reading
1
Meta - AI Open Source Doesn't Pay the Bills ($META as an AI Stock)
36:34
36:34
Play later
Play later
Lists
Like
Liked
36:34
Meta decided to be a metaverse company and now wants to be an AI company. But open source AI models don't lead to revenue, and Meta's main strategies to monetize AI are questionable. Nonetheless, Meta's advertising business is booming, and the ban on TikTok may lead to lesser competition in short-form video. While Meta has successfully leveraged AI…
…
continue reading
1
The Types Of Gun Store Customers I Can't Stand
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54
Colion Noir sits down with his good friend Cody to discuss the art of gun sales. This relatable episode has Colion sharing his early experiences hustling through gun shops and how his YouTube channel started with reviews and collaborations with local stores. Cody talks about his deep-rooted connection with firearms and his journey to becoming an ex…
…
continue reading
1
Hacker Heroes - Joe Grand - PSW Vault
1:43:58
1:43:58
Play later
Play later
Lists
Like
Liked
1:43:58
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
…
continue reading
1
I Just Flew In From Germany and Boy Are My Arms Tired
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35
Dan and Joe discuss Joe's recent firewood vacation to Germany and the comparison to European style firewood to the US. Oh, yeah...and the food, the cars, the beer and the like.By The Wood Hounds
…
continue reading
We hear from Peter Gabriel, who is endorsing a competition to find a way of decoding animal communications using A.I. and then talk back to them. We get more details of the challenge from the chair of the prize, Professor Yossi Yovel. Microplastics in our seas and drinking water is a real problem. Two teenage students from Texas have found an innov…
…
continue reading
Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on March 6, 2017. Have you ever wondered what phishing is? Do you know what spear phishing attacks are? Doug and Russ explain how to protect yourself from phishing scams in the inaugural episode of Secure Digit…
…
continue reading
1
Special Alert: DOJ Cracks Down on Nearly 200 Involved in Major Healthcare Fraud Schemes
28:55
28:55
Play later
Play later
Lists
Like
Liked
28:55
In a late-breaking press release, the U.S. Department of Justice (DOJ) announced late Thursday that the agency had charged nearly 200 individuals accused with involvement in various healthcare fraud schemes estimated at $2.7 billion. Charges were brought against nurses, physicians, and others in a national sweep, and it was estimated that more than…
…
continue reading
1
CISOs 2023 Planning Guide: Forecast The Recession's Impact On Your Program - Jeff Pollard - BSW Vault
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21
Check out this interview from the BSW Vault, hand picked by main host Matt Alderman! This segment was originally published on October 11, 2022. As 2023 approaches, security leaders are hard at work preparing their budgets, identifying their projects, and setting their priorities for the next twelve months. At the same time, the growth mode days of …
…
continue reading
On the night of 9th November 1996, Alana Cecil, who had only recently turned 16, was excited to attend the Djerriwarrh Bonfire Festival in the small city of Melton, just out of Melbourne in Victoria, Australia. When she left home that night it would be the last time her family would ever see her alive. Sometime in the early hours of November 10th 1…
…
continue reading
1
Is GenAI Having a Rough Time? We check in to see how it's doing. - ESW #366
1:00:24
1:00:24
Play later
Play later
Lists
Like
Liked
1:00:24
We've made a slight tweak to the news format, only focusing on the most interesting funding and acquisition stories. As always, you can go check out Mike Privette's Return on Security newsletter for the full list of funded and acquired companies every week. This week, we discuss two $100M+ rounds, from Huntress and Semperis. We also discuss NetSPI'…
…
continue reading
1
Shifting Cybersecurity Philosophy from Threat-Centric to Compromise-Centric - Martin Roesch - ESW #366
42:32
42:32
Play later
Play later
Lists
Like
Liked
42:32
For decades, security teams have been focused on preventing and detecting threats, only to find themselves buried so deep in alerts, they can't detect anything at all! We clearly need a different approach, which will be the topic of our conversation today with Marty. We'll be discussing a shift in philosophy and tactics. We'll discuss whether SecOp…
…
continue reading
1
MoveIT, Entrust, Fed Reserve, ISPs, Volt Typhoon & More - SWN #395
29:09
29:09
Play later
Play later
Lists
Like
Liked
29:09
Healthcare and malware, MoveIT, Chrome won't trust Entrust, the discovery of Volt Typhoon, & more on this episode of the Security Weekly News! Segment Resources: https://therecord.media/volt-typhoon-targets-underestimated-cisa-says Show Notes: https://securityweekly.com/swn-395
…
continue reading
1
The risks and best practices of deploying AI to an enterprise - Anurag Lal - ESW #366
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34
We all might be a little worn out on this topic, but there's no escaping it. Executives want to adopt GenAI and it is being embedded into nearly every software product we use in both our professional and personal lives. In this interview, Anurag joins us to discuss how his company evaluated and ultimately integrated AI-based technologies into their…
…
continue reading
1
Hack all the things, patch all the things - PSW #833
1:50:38
1:50:38
Play later
Play later
Lists
Like
Liked
1:50:38
Zyxl NAS devices are under attack and the exploit is pretty simple, A new UEFI vulnerability with a name that some people don't like, that time you setup a load balancer and forgot about it, I love it when there is a vulnerability in a Wifi driver, Polyfill is filling the Internet with supply chain vulnerabilities, open source doesn't mean more sec…
…
continue reading
1
3 AI Stocks You've Never Heard Of - Coherent (COHR), Axcelis (ACLS), and ASE (ASX)
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46
Everyone knows Nvidia (NVDA) and Microsoft, but what are the next big AI winners? We cover three companies that are critical to the AI supply chain: Coherent ($COHR), a company making lasers used in the manufacture of AI chips and digital displays, Axcelis Technologies (ACLS), a company that specializes in ion implantation machines, and ASE Technol…
…
continue reading
1
Do We Need Penetration Testing and Vulnerability Scanning? - Adrian Sanabria, Josh Bressers - PSW #833
1:00:55
1:00:55
Play later
Play later
Lists
Like
Liked
1:00:55
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Show Notes: https://securityweekly.com/psw-8…
…
continue reading
1
Reality TV Star & Fashion-Forward Gun Enthusiast Heidi Dillon Talks The Necessity Of Guns
43:28
43:28
Play later
Play later
Lists
Like
Liked
43:28
Despite Heidi Dillon's glamorous background being known for reality TV shows and producing content for networks like E! and MTV, she doesn't hide her passion for survival training and being a fashion-forward gun enthusiast. Heidi reveals her reasons for pursuing firearm training, highlighting her desire to be prepared for any eventuality. Throughou…
…
continue reading
1
#076 The Alliance of Entrepreneurs and Scientists with Arkady Kulik of RPV
1:24:45
1:24:45
Play later
Play later
Lists
Like
Liked
1:24:45
Topics: (00:00:00) - Intro (00:04:43) - Russian interpretations of friendship (00:09:28) - Thoughts on the state of society and its rate of technological adoption (00:13:22) - Creating alliances between entrepreneurs, capitalists, and scientists (00:17:17) - Rick Rubin on Creativity in Investing (00:20:55) - Does Taste exist in the world of VC? (00…
…
continue reading
1
Recapping The 2024 Midwest Firewood Frenzy
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13
The 2024 Midwest Firewood Frenzy was held on June 22, 2024 in Eau Claire Wisconsin and brought together a number of firewood fans and YouTube channels for the day. The event was held at the Wolfe Ridge MFG factory which had their entire lineup of log splitters, grapples, and firepits on display. Dan was in attendance and gave us a summary of the da…
…
continue reading
1
Shared Responsibility Models, AI in Offensive Security, Apple's Private Cloud Compute - ASW #289
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10
Thoughts on shared responsibility models after the Snowflake credential attacks, looking at AI's current and future role in offensive security, secure by design lessons from Apple's Private Cloud Computer, and more! Show Notes: https://securityweekly.com/asw-289
…
continue reading
1
Detecting cancer using artificial intelligence
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29
Experts develop a new blood test that could change the way suspected cases of bowel cancer are managed. At the heart of it is A.I. analysis to calculate a patient's cancer risk. We speak to the team behind the PinPoint Test. Also on Tech Life this week, period trackers and your personal data - find out how one app is promising to keep your informat…
…
continue reading
1
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet - SWN #394
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16
Baltimore, GPS Jammed, US bans, ARM, YouTube, Kraken and Joshua Marpet, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-394
…
continue reading
1
OAuth 2.0 from Protecting APIs to Supporting Authorization & Authentication - Aaron Parecki - ASW #289
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
OAuth 2.0 is more than just a single spec and it's used to protect more than just APIs. We talk about challenges in maintaining a spec over a decade of changing technologies and new threat models. Not only can OAuth be challenging to secure by default, but it's not even always inter-operable. Segment Resources: https://oauth.net/2.1 https://oauth.n…
…
continue reading
1
AI at Work 2024: C-suite Perspectives on Artificial Intelligence - Bhawna Singh - BSW #354
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
In the age of AI, driving a business forward requires balancing three very significant considerations: growth through innovation, productivity through operational efficiency, and trust through security. To better understand how AI impacts the intersection of security, innovation, and operational efficiency, Okta commissioned an AlphaSights survey o…
…
continue reading
1
Building a Successful API Security Strategy - Luke Babarinde - BSW #354
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41
With 71% of web traffic coming from API calls last year and the average organization maintaining 613 API endpoints, a robust strategy is needed to protect APIs against automated threats and business logic attacks. Tune in as Luke Babarinde, Global Solution Architect, shares the key steps to building a successful API security strategy. This segment …
…
continue reading
1
How a Different Type of Whistleblower Created a Lesson Worth Learning
28:57
28:57
Play later
Play later
Lists
Like
Liked
28:57
A recent federal court decision in New Jersey demonstrates the viability of a different kind of whistleblower – in this case, a privately defrauded party. The most common type of a whistleblower under the False Claims Act (FCA) tends to be a corporate insider who sees fraud committed against the government by their employer or a company they work w…
…
continue reading
1
S4 | Episode 11 | The St Albans Witnesses
53:57
53:57
Play later
Play later
Lists
Like
Liked
53:57
On the night of 9th November 1996, Alana Cecil, who had only recently turned 16, was excited to attend the Djerriwarrh Bonfire Festival in the small city of Melton, just out of Melbourne in Victoria, Australia. When she left home that night it would be the last time her family would ever see her alive. Sometime in the early hours of November 10th 1…
…
continue reading
1
Access vs Actions, Beyond Traditional IGA, Remote Identity Verification, & Fraud - Tim Prendergast, Damon Tompkins, Andrew Bud, Chris Meyer - ESW Vault
58:32
58:32
Play later
Play later
Lists
Like
Liked
58:32
Traditional approaches to access management are no longer sufficient to safeguard enterprise security. Tim will explain why the most effective approach to modern enterprise security requires a Zero Trust model that extends beyond just access to encompass every action, no matter how minor. Tim will describe the importance of implementing a Zero Trus…
…
continue reading