Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Signaling Theory cuts through crypto’s noise to find the real signals. Host Rex Kirshner joins builders, thinkers, and researchers who are shaping the space for deep, nuanced and informed conversations. Curiosity first, signal over noise.
…
continue reading
Story
…
continue reading
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
…
continue reading
Intellectually Curious is a podcast by Mike Breault featuring over 1,600 AI-powered explorations across science, mathematics, philosophy, and personal growth. Each short-form episode is generated, refined, and published with the help of large language models—turning curiosity into an ongoing audio encyclopedia. Designed for anyone who loves learning, it offers quick dives into everything from combinatorics and cryptography to systems thinking and psychology. Inspiration for this podcast: "Mu ...
…
continue reading
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users — whether artists, coders, creators, developers, companies, organizations, or communities — now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. From ...
…
continue reading
PowerShell Community
…
continue reading
Welcome to Cypherpunk’d, where we explore the intersection of privacy, technology, and personal freedom in the digital age. Hosted by Matty Ice, this podcast delves into the challenges posed by government surveillance and big tech’s intrusion into our lives. We bring you thought-provoking conversations with thought leaders, authors, computer scientists, Bitcoiners, entrepreneurs, and human rights activists who are at the forefront of the digital resistance. Each episode cuts through the nois ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
Zero Knowledge is a podcast which goes deep into the tech that will power the emerging decentralised web and the community building this. Covering the latest in zero knowledge research and applications, the open web as well as future technologies and paradigms that promise to change the way we interact — and transact — with one another online. Zero Knowledge is hosted by Anna Rose Follow the show at @ZeroKnowledgefm (https://twitter.com/zeroknowledgefm) or @AnnaRRose (https://twitter.com/Ann ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
…
continue reading
The official podcast of the Satoshi Nakamoto Institute
…
continue reading
Conversations with Web3 builders about what they're working on right now. Topics include: Ethereum, EVM, Solidity, blockchain programming and indexing, L2 scaling solutions, zero knowledge, multi-party computation, cryptography, NFTs, crowdfunding, blockchain art, onchain performance art, and building networks and community. Subscribe with your favorite podcast app https://web3galaxybrain.com
…
continue reading
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics! RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
…
continue reading
Applications of Quantum Computing 1. Cryptography Quantum computers have the potential to break traditional encryption methods, prompting the development of quantum-resistant cryptographic algorithms. 2. Optimization Quantum computing excels in solving complex optimization problems, such as logistics, supply chain management, and financial modeling. https://kek.co/product/buy-youtube-views/
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
Welcome to Tech 'n Savvy! April is a software engineer, and Emily is a quantum computing and cryptography consultant. Listen in as we explore topics in technology and global issues important to us.
…
continue reading
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
…
continue reading
Close your eyes and let the universe unfold. Sleep with Science is a nightly invitation to explore the quiet wonder of the natural world. Through calm, unhurried narration, we transform complex scientific ideas into soothing stories that ease your mind and spark gentle curiosity. From the vast patterns of astronomy to the elegant code of DNA, each episode offers a soft passage into topics like physics, biology, geology, helping you learn while you unwind. Perfect for thoughtful minds and res ...
…
continue reading
A podcast hosted by Blockchain Israel, the largest community in Israel dedicated to Blockchain Solutions and Crypto Technologies. We'll be bringing thought leaders across industries to hear about their insights and input on how blockchain and crypto and its potential to disrupt industries. Our featured topics: Blockchain · Bitcoin · Cryptocurrency · Smart Contracts · Digital Currency · Virtual Currency · Decentralization · Cryptography · Decentralized Systems · Smart Property
…
continue reading
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
What does quantum physics tell us about reality? What progress have we made since the days of Einstein and Schrödinger, and what problems are today’s quantum research scientists trying to solve? This podcast aims to share a modern perspective on the most fundamental aspects of quantum theory, informed by up-to-date research insights. In each episode, I interview an active researcher about a topic related to their work, with the discussion aimed to be broadly accessible.
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
🎙️ In The Clouds: The First d/acc Podcast Exploring the intersection of technology, human agency, and our collective future through the lens of defensive accelerationism (d/acc). Join Hunter and Sam as we dive deep into emerging technologies, digital sovereignty, and how we can preserve human agency while embracing technological progress. 🔍 We cover: - AI and superintelligence - Digital sovereignty - Brain-computer interfaces - Cryptography and privacy - Decentralized systems - Cybernetics a ...
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
1
en clair: forensic linguistics, literary detection, language mysteries, and more
Dr Claire Hardaker
en clair is a podcast about forensic linguistics, literary detection, language mysteries, cryptography, codes, language and the law, linguistic crime, undeciphered languages, and more, from past to present. Credits, links, podcast transcripts and more in the Case Notes: wp.lancs.ac.uk/enclair
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
The PowerShell Podcast is a weekly show about building your career with PowerShell. Each episode features the tips, tech, and modules that make PowerShell the premier automation and scripting tool for IT professionals. Join us as we interview PowerShell experts to discover what makes PowerShell and its community so amazing and awesome.
…
continue reading
Podcast about science in Luxembourg and beyond - in every episode we have a look at the latest scientific research and technological changes in Luxembourg or we discuss it with scientists or researchers working in Luxembourg. This is a podcast for people who love science, but aren't necessarily science graduates. We post a new episode every second week.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
1
The End of Static Cryptography: What Leaders Must Understand Now
20:47
20:47
Play later
Play later
Lists
Like
Liked
20:47Post-quantum cryptography does not arrive as a clean replacement for today’s systems. It forces organizations to rethink how cryptography is designed, deployed, governed, and maintained over time. In this special episode of Shielded, host Jo Lintzen leads a discussion that moves past algorithm selection and into operational reality. The panel conne…
…
continue reading
1
Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47A rigorous, introductory treatment of modern cryptography, focusing on definitions, precise assumptions, and proofs of security as distinguishing features from classical cryptography. It explores private-key encryption in depth, covering concepts like chosen-plaintext attacks (CPA-security) and chosen-ciphertext attacks (CCA-security), along with p…
…
continue reading
1
The IACR Can't Decrypt with Matt Bernhard
56:49
56:49
Play later
Play later
Lists
Like
Liked
56:49The International Association of Cryptologic Research held their regular election using secure voting software called Helios…and lost the keys to decrypt the results, leaving them with no choice but to throw out the vote and call a new election. Hilarity ensues. We welcome special guest Matt Bernhard who actually works on secure voting systems to e…
…
continue reading
1
Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
…
continue reading
1
World-leaders in Cryptography: Giuseppe Ateniese
1:34:41
1:34:41
Play later
Play later
Lists
Like
Liked
1:34:41Giuseppe is a Professor, Eminent Scholar in the Cybersecurity and CCI Faculty Fellow in the Department of Computer Science and the Department of Cyber Security Engineering at George Mason University. He has advanced many areas of research, including proxy re-encryption, anonymous communication, two-party computation, secure storage, and provable da…
…
continue reading
1
Rethinking IoT Innovation: From Industrial Legacy Systems to Next-Gen Wi-Fi
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38Send us a text On this episode of Embedded Insiders, Ken sits down with Felix Galindo, a Principal Engineer at Digi International, to discuss the impending upgrade crisis for industrial facilities and legacy connectivity in Industrial IoT. Watch this segment: https://www.youtube.com/watch?v=ambwtKT63s0 The next segment is sponsored by Infineon Tech…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025. The myth of a malware-free Mac is a thing of the past. Here’s how Mac threats evolved in 2025 — and what’s coming next. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
…
continue reading
1
I Saw a Phishing Site That Traps Security Bots
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26This story was originally published on HackerNoon at: https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots. How modern phishing kits use honeypots, cloaking, and adversary-in-the-middle attacks—and how defenders can turn those same tactics against them. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybers…
…
continue reading
1
Cron: From Polling to Precision—the Quiet Engine of Time-Based Automation
5:32
5:32
Play later
Play later
Lists
Like
Liked
5:32A deep dive into Cron, the five-field scheduler that powers recurring tasks across multi-user systems. We trace its evolution from the brutal minute-by-minute polling of early Unix, through System V’s discrete-event scheduling, to modern standards like Vixie Cron and the OpenCron Patterns Specification—explaining how the leap from “is it time yet?”…
…
continue reading
1
Hanging by a Curve: The Catenary, Parabolas, and the Shape of Structural Genius
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16We explore the catenary—the true curve of a freely hanging chain and the mathematics it hides. Learn why it isn’t a parabola, how Galileo and Hooke unlocked its secrets, and why flipping the curve turns tension into compression for elegant, efficient arches. From the Gateway Arch to Gaudí’s mosaics, we’ll contrast true suspension curves with bridge…
…
continue reading
1
Conservation laws with Dr Chiara Marletto
1:17:59
1:17:59
Play later
Play later
Lists
Like
Liked
1:17:59Our most far-reaching principles of physics are not about what changes, but what stays the same: conservation laws. In this episode of the Quantum Foundations Podcast, Dr Chiara Marletto from the University of Oxford explains how such principles enable discovery of new physical phenomena; their central role in thermodynamics; controversies about ho…
…
continue reading
1
A Masterclass in Based Rollups w/ Jason Vranek (Fabric)
1:03:24
1:03:24
Play later
Play later
Lists
Like
Liked
1:03:24Based rollups have been floating around Ethereum discourse for a couple years now, but the concept remains confusing even to people who understand rollups generally. The pitch sounds almost contradictory: use Ethereum's decentralized validator set to sequence rollups, but somehow still get the fast, smooth UX of centralized sequencers like Base or …
…
continue reading
1
3546: Box and the Leadership Shifts Behind Becoming an AI First Company
27:40
27:40
Play later
Play later
Lists
Like
Liked
27:40What does it actually take to move beyond AI pilots and turn enterprise ambition into real productivity gains? That question sat at the center of my conversation with Olivia Nottebohm, Chief Operating Officer at Box, and it is one that every boardroom seems to be wrestling with right now. AI conversations have matured quickly. The early excitement …
…
continue reading
1
Shark Teeth: Biology, Evolution, and Cultural History
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00We explore how sharks replace tens of thousands of teeth with a multi-row, multi-series conveyor system, how warmer waters speed turnover, and why fluorapatite enamel makes their teeth incredibly durable. From fossil megalodon teeth to modern biomaterials, we uncover the architecture of apex predation and how this self-renewing toolkit inspires dur…
…
continue reading
1
The Architect’s Dilemma: Why Security Design Keeps Failing (and How to Fix It)
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45Episode Summary Most security architects are not actually doing architecture. They are doing assurance work, following checklists, and hoping standards will save them. But as systems get more complex and attackers get faster, that approach is no longer good enough. In this episode of Secured, Cole sits down with Ken Fitzpatrick, founder of Patterne…
…
continue reading
1
The Authorization Gap No One Wants to Talk About: Why Your API Is Probably Leaking Right Now
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41This story was originally published on HackerNoon at: https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now. Broken Object Level Authorization (BOLA) is eating the API economy from the inside out. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You …
…
continue reading
1
IPv6 and CTV: The Measurement Challenge From the Fastest-Growing Ad Channel
13:34
13:34
Play later
Play later
Lists
Like
Liked
13:34This story was originally published on HackerNoon at: https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel. IPv6 breaks digital ad measurement. Learn how IPinfo’s research-driven, active-measurement model restores accuracy across CTV and all channels. Check more stories related to cybersecurity at: https…
…
continue reading
1
The Obsession That Destroys Startups (with LayerZero CEO)
30:28
30:28
Play later
Play later
Lists
Like
Liked
30:28with @PrimordialAA @rhackett In this episode, host Robert Hackett sits down with Bryan Pellegrino, cofounder and CEO of LayerZero, one of the core infrastructure projects that enables blockchains to talk to one another. We talk about why crypto went multichain, what it means for crypto to compete with legacy financial systems, and a lesson Bryan to…
…
continue reading
1
Hyaloclastite: Fire, Ice, and the Geological Time Capsule
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26On a black-sand beach, lava collides with ice or seawater to forge hyaloclastite —glass fragments instantly shattered by thermal shock and cemented into palagonite. In this episode we unravel how non-explosive quench fragmentation creates jigsaw-fit textures that freeze the exact moment of contact, how palagonitization turns loose debris into solid…
…
continue reading
1
The 32-Bar Blueprint: How AABA Makes Great Songs Feel Effortless
4:24
4:24
Play later
Play later
Lists
Like
Liked
4:24A rigorous yet intimate tour of the 32‑bar song form (AABA) that underpins countless classics. We break down the four eight‑bar sections—three A sections with the same hook, a contrasting B bridge, and a triumphant return—and show how this tight structure creates emotional payoff. From Gershwin’s I Got Rhythm to early rock ’n’ roll and even Doctor …
…
continue reading
1
Moist Sand, Mighty Structures: The Physics of Sandcastles
5:07
5:07
Play later
Play later
Lists
Like
Liked
5:07Why does dry sand crumble while a splash of water lets it stand tall? We dive into the granular physics behind sandcastles, exploring capillary bridges, surface tension, and the surprising power of tiny water fractions. Learn about the pendular and funicular regimes, why about 1% water is often optimal, and how compaction strengthens the structure.…
…
continue reading
1
Introduction to Compiler Construction in a Java World
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50A hands-on introduction to compiler construction, emphasizing Java technology and software engineering principles. It guides readers through the process of building and extending a real, functional Java compiler for a Java subset called "j--". The material covers fundamental compiler phases, including lexical analysis (scanning), parsing (syntax-di…
…
continue reading
1
Episode 50 - Digital Dictatorships - Velvet Glove Coup
1:25:46
1:25:46
Play later
Play later
Lists
Like
Liked
1:25:46Show Notes - https://forum.closednetwork.io/t/episode-50-digital-dictatorships-velvet-glove-coup/170 Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privacy Bad Ass David - Privacy Bad …
…
continue reading
1
3545: LogicMonitor and the Rise of AI Native Observability in Enterprise IT
43:17
43:17
Play later
Play later
Lists
Like
Liked
43:17What happens when the systems we rely on every day start producing more signals than humans can realistically process, and how do IT leaders decide what actually matters anymore? In this episode of Tech Talks Daily, I sit down with Garth Fort, Chief Product Officer at LogicMonitor, to unpack why traditional monitoring models are reaching their limi…
…
continue reading
1
Violence | Knut Svanholm: Everything Divided By 21 Million | Episode 8 of 12
27:01
27:01
Play later
Play later
Lists
Like
Liked
27:01In this episode of Cypherpunk'd, I sit down with author Knut Svanholm (Everything Divided by 21 Million) to discuss the terrifying link between central banking and global conflict. We explore the "Consensus Mechanism of Fiat"—World War—and why inflation isn't just an economic annoyance, but a form of modern-day slavery. If you’ve ever wondered why …
…
continue reading
1
Hidden Markov Models Made Simple: From Trash Cans to Hidden States
5:24
5:24
Play later
Play later
Lists
Like
Liked
5:24A friendly, intuitive tour of Hidden Markov Models (HMMs). Using the relatable 'full trash bin means he's home' metaphor, we explore how to infer unseen states from noisy observations, learn the model parameters with Baum–Welch, and decode the most likely state sequence with the Viterbi algorithm. You’ll see how forward–backward smoothing combines …
…
continue reading
1
Dew Point Demystified: The Quiet Meter Behind Comfort, Clouds, and Condensation
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51We break down the dew point—what it is, why it matters for your comfort, aviation, and building design—and how engineers estimate it with the Magnus–Tetens and Buck equations. Learn why sensor errors often dominate accuracy, how the gap between air temperature and dew point sets cloud base, and a look at extreme dew-point values. Note: This podcast…
…
continue reading
1
NVIDIA Rubin: Extreme Co-Design and the Invisible AI Infrastructure
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51Join us as we unpack the NVIDIA Rubin platform—the next-gen AI supercomputer built around extreme co-design. We map the six-chip system (Vera CPU, Rubin GPU, NVLink 6, Connect X9, BlueField 4 DPU) and its groundbreaking bandwidth and efficiency gains, from 3.6 TB/s per GPU to 10x lower inference costs and MOE training with 4x fewer GPUs. We explore…
…
continue reading
1
Hands-On Python Deep Learning for the Web: Integrating neural network architectures to build smart web apps with Flask, Django
18:27
18:27
Play later
Play later
Lists
Like
Liked
18:27A comprehensive guide to deep learning for web development, specifically with Python. It covers the foundational concepts of machine learning and neural networks, including various types like CNNs and RNNs, and essential terminology such as bias, variance, overfitting, and underfitting. The sources provide practical instruction on building and depl…
…
continue reading
1
3544: Make: No-Code, Automation and AI agents In One Visual Platform
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47Are we asking ourselves an honest question about who really owns automation inside a business anymore? In my conversation with Darin Patterson, Vice President of Market Strategy at Make, we explore what happens when speed becomes the default requirement, but visibility and structure fail to keep up. Make has become one of the breakout platforms for…
…
continue reading
https://mcdn.podbean.com/mf/web/dg2zf2mjiwzy62cg/The_PowerShell_Podcast_episode_208_Ryan_Spletzer66wgr.mp3 Distinguished Software Engineer Ryan Spletzer joins The PowerShell Podcast to talk about building a long-term career in tech through curiosity, continuous learning, and strong community connections. Ryan shares how PowerShell helped shape his …
…
continue reading
1
PowerShell to Distinguished Engineer with Ryan Spletzer
1:12:03
1:12:03
Play later
Play later
Lists
Like
Liked
1:12:03Distinguished Software Engineer Ryan Spletzer joins The PowerShell Podcast to talk about building a long-term career in tech through curiosity, continuous learning, and strong community connections. Ryan shares how PowerShell helped shape his path from early work in SharePoint, automation, and identity management to leading AI initiatives at Autode…
…
continue reading
1
Threads as Code: Weaving, Recursion, and the Dawn of Computation
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03Take a journey into how ancient textiles function as living programs. We examine Andean backstrap weaving and Japanese ikat not just as art, but as sophisticated algorithmic systems: from on-the-fly debugging as a weaver adjusts a row, to pre-dyed patterns that compile into the fabric. We connect motifs as macro-operations, recursion in repeating m…
…
continue reading
1
Zermelo's Theorem: The First Formal Game Theory Result
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42We explore Ernst Zermelo's 1913 theorem for two-player, perfect-information, deterministic games. It guarantees that such games are solvable: one side can force a win, or both can force at least a draw. We unpack the non-repetition argument, why it's finite, and how this foundational insight underpins modern game theory, AI, and formal verification…
…
continue reading
1
Goodput, Not Just Throughput: Prefill, Decode, and Rethinking AI Inference
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23We unpack the core bottleneck in streaming AI: the split between heavy pre-fill computations and fast, memory-light decoding. From chunked prefill to physical separation (DissServe) and logical isolation (DuetServe), we explore how phase isolation eliminates interference, delivering 2x–4.5x better goodput and transforming cost efficiency. Join us a…
…
continue reading
1
Hacklog Volume 2 Web Hacking: Manuale sulla Sicurezza Informatica e Hacking Etico
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13A detailed guide to web hacking, IT security, and ethical hacking practices. It systematically explores a wide array of vulnerabilities and attack methodologies common to web applications, alongside corresponding defense techniques. The document is structured to educate readers on fundamental web technologies, popular hacking tools, and practical l…
…
continue reading
1
3543: From App Stores to Ownership, Xsolla on Gaming's D2C Turning Point
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Was 2025 the year the games industry finally stopped talking about direct-to-consumer and started treating it as the default way to do business? In this episode of Tech Talks Daily, I'm joined by Chris Hewish, President at Xsolla, for a wide-ranging conversation about how regulation, platform pressure, and shifting player expectations have pushed D…
…
continue reading
1
3542: Samsara on Scaling Human Expertise With AI, Not Replacing It
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21In this episode of Tech Talks Daily, I'm joined by Kiren Sekar, Chief Product Officer at Samsara, to unpack how AI is finally showing up where it matters most, in the frontline operations that keep the global economy moving. From logistics and construction to manufacturing and field services, these industries represent a huge share of global GDP, y…
…
continue reading
Jacobi’s exact four-square formula makes r4(n) elegant, but five squares lead to deeper territory with half-integral weight forms and L-functions. In this episode we trace Emil Grosswald’s clever reduction of r5(n) to a sum of r4(n), bypassing the circle method to yield a sharp asymptotic, and we unpack the main term, the role of L-series, the cusp…
…
continue reading
1
Phantom Rivers: The Hidden Waterways that Built Our Cities
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52We uncover phantom cities defined by riverine logic: buried systems (medieval rivers and culverted canals), drowned landscapes (post-glacial river basins now submerged), and canalized rivers forgotten in the city’s routine. From Perugia’s 13th-century aqueduct to London’s Lost Rivers and modern restoration efforts, archaeology, geophysics, and proa…
…
continue reading
1
Cymatics: The Visible Geometry of Sound Waves
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41A deep dive into cymatics—the study of visible patterns produced by vibration. We trace its history from Hooke's flour-drag experiments on a vibrating plate to Chladni's sand figures, then to Faraday's liquid waves and Hans Jenny's iconic imagery. We explore how a medium's geometry predetermines the possible patterns, how modern engineers use sound…
…
continue reading
1
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37Functions as an all-in-one exam guide for the GPEN certification, covering essential penetration testing methodologies and tools. It includes detailed chapters on reconnaissance, initial access, execution, and reporting, with specific sections dedicated to the Metasploit Framework and PowerShell Empire. The guide emphasizes practical application th…
…
continue reading
1
3541: How IBS Software Sees AI Redefining Airline Retail and Loyalty
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13What if airlines stopped thinking in terms of seats and schedules and started designing for the entire journey instead? In this episode of Tech Talks Daily, I'm joined by Somit Goyal, CEO of IBS Software, to talk about how travel technology is being rebuilt at its foundations. Since we last spoke, AI has moved from experimentation into everyday ope…
…
continue reading