show episodes
 
Artwork
 
Signaling Theory cuts through crypto’s noise to find the real signals. Host Rex Kirshner joins builders, thinkers, and researchers who are shaping the space for deep, nuanced and informed conversations. Curiosity first, signal over noise.
  continue reading
 
Artwork
 
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
  continue reading
 
Intellectually Curious is a podcast by Mike Breault featuring over 1,600 AI-powered explorations across science, mathematics, philosophy, and personal growth. Each short-form episode is generated, refined, and published with the help of large language models—turning curiosity into an ongoing audio encyclopedia. Designed for anyone who loves learning, it offers quick dives into everything from combinatorics and cryptography to systems thinking and psychology. Inspiration for this podcast: "Mu ...
  continue reading
 
Artwork

1
web3 with a16z crypto

a16z crypto, Robert Hackett, Sonal Chokshi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users — whether artists, coders, creators, developers, companies, organizations, or communities — now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. From ...
  continue reading
 
Artwork

1
Cypherpunk’d

cypherpunkd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Cypherpunk’d, where we explore the intersection of privacy, technology, and personal freedom in the digital age. Hosted by Matty Ice, this podcast delves into the challenges posed by government surveillance and big tech’s intrusion into our lives. We bring you thought-provoking conversations with thought leaders, authors, computer scientists, Bitcoiners, entrepreneurs, and human rights activists who are at the forefront of the digital resistance. Each episode cuts through the nois ...
  continue reading
 
Artwork

4
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Artwork

1
Cryptography FM

Symbolic Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
  continue reading
 
Artwork

1
Zero Knowledge

Zero Knowledge Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Zero Knowledge is a podcast which goes deep into the tech that will power the emerging decentralised web and the community building this. Covering the latest in zero knowledge research and applications, the open web as well as future technologies and paradigms that promise to change the way we interact — and transact — with one another online. Zero Knowledge is hosted by Anna Rose Follow the show at @ZeroKnowledgefm (https://twitter.com/zeroknowledgefm) or @AnnaRRose (https://twitter.com/Ann ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Artwork

1
Monero Talk

Monero Talk

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
  continue reading
 
Conversations with Web3 builders about what they're working on right now. Topics include: Ethereum, EVM, Solidity, blockchain programming and indexing, L2 scaling solutions, zero knowledge, multi-party computation, cryptography, NFTs, crowdfunding, blockchain art, onchain performance art, and building networks and community. Subscribe with your favorite podcast app https://web3galaxybrain.com
  continue reading
 
Artwork

1
TechnologyAI

Mike sanders

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Applications of Quantum Computing 1. Cryptography Quantum computers have the potential to break traditional encryption methods, prompting the development of quantum-resistant cryptographic algorithms. 2. Optimization Quantum computing excels in solving complex optimization problems, such as logistics, supply chain management, and financial modeling. https://kek.co/product/buy-youtube-views/
  continue reading
 
Artwork

1
Tech 'n Savvy

Tech 'n Savvy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Tech 'n Savvy! April is a software engineer, and Emily is a quantum computing and cryptography consultant. Listen in as we explore topics in technology and global issues important to us.
  continue reading
 
Artwork

1
Intellectual Icebergs

Ankh Infinity Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
  continue reading
 
Close your eyes and let the universe unfold. Sleep with Science is a nightly invitation to explore the quiet wonder of the natural world. Through calm, unhurried narration, we transform complex scientific ideas into soothing stories that ease your mind and spark gentle curiosity. From the vast patterns of astronomy to the elegant code of DNA, each episode offers a soft passage into topics like physics, biology, geology, helping you learn while you unwind. Perfect for thoughtful minds and res ...
  continue reading
 
Artwork

1
Blockchain Israel

Mordecai Holtz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
A podcast hosted by Blockchain Israel, the largest community in Israel dedicated to Blockchain Solutions and Crypto Technologies. We'll be bringing thought leaders across industries to hear about their insights and input on how blockchain and crypto and its potential to disrupt industries. Our featured topics: Blockchain · Bitcoin · Cryptocurrency · Smart Contracts · Digital Currency · Virtual Currency · Decentralization · Cryptography · Decentralized Systems · Smart Property
  continue reading
 
Artwork

1
HerHax Podcast

herhaxpodcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
  continue reading
 
Artwork

1
ASecuritySite Podcast

Professor Bill Buchanan OBE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Artwork

1
Trail of Bits

Trail of Bits

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
  continue reading
 
What does quantum physics tell us about reality? What progress have we made since the days of Einstein and Schrödinger, and what problems are today’s quantum research scientists trying to solve? This podcast aims to share a modern perspective on the most fundamental aspects of quantum theory, informed by up-to-date research insights. In each episode, I interview an active researcher about a topic related to their work, with the discussion aimed to be broadly accessible.
  continue reading
 
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
  continue reading
 
🎙️ In The Clouds: The First d/acc Podcast Exploring the intersection of technology, human agency, and our collective future through the lens of defensive accelerationism (d/acc). Join Hunter and Sam as we dive deep into emerging technologies, digital sovereignty, and how we can preserve human agency while embracing technological progress. 🔍 We cover: - AI and superintelligence - Digital sovereignty - Brain-computer interfaces - Cryptography and privacy - Decentralized systems - Cybernetics a ...
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
The PowerShell Podcast is a weekly show about building your career with PowerShell. Each episode features the tips, tech, and modules that make PowerShell the premier automation and scripting tool for IT professionals. Join us as we interview PowerShell experts to discover what makes PowerShell and its community so amazing and awesome.
  continue reading
 
Artwork

1
SciLux

Hanna Siemaszko

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Podcast about science in Luxembourg and beyond - in every episode we have a look at the latest scientific research and technological changes in Luxembourg or we discuss it with scientists or researchers working in Luxembourg. This is a podcast for people who love science, but aren't necessarily science graduates. We post a new episode every second week.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Artwork

4
Network Break

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
  continue reading
 
Artwork

1
Embedded Insiders

Embedded Computing Design

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
  continue reading
 
Loading …
show series
 
Post-quantum cryptography does not arrive as a clean replacement for today’s systems. It forces organizations to rethink how cryptography is designed, deployed, governed, and maintained over time. In this special episode of Shielded, host Jo Lintzen leads a discussion that moves past algorithm selection and into operational reality. The panel conne…
  continue reading
 
A rigorous, introductory treatment of modern cryptography, focusing on definitions, precise assumptions, and proofs of security as distinguishing features from classical cryptography. It explores private-key encryption in depth, covering concepts like chosen-plaintext attacks (CPA-security) and chosen-ciphertext attacks (CCA-security), along with p…
  continue reading
 
The International Association of Cryptologic Research held their regular election using secure voting software called Helios…and lost the keys to decrypt the results, leaving them with no choice but to throw out the vote and call a new election. Hilarity ensues. We welcome special guest Matt Bernhard who actually works on secure voting systems to e…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
  continue reading
 
Giuseppe is a Professor, Eminent Scholar in the Cybersecurity and CCI Faculty Fellow in the Department of Computer Science and the Department of Cyber Security Engineering at George Mason University. He has advanced many areas of research, including proxy re-encryption, anonymous communication, two-party computation, secure storage, and provable da…
  continue reading
 
Send us a text On this episode of Embedded Insiders, Ken sits down with Felix Galindo, a Principal Engineer at Digi International, to discuss the impending upgrade crisis for industrial facilities and legacy connectivity in Industrial IoT. Watch this segment: https://www.youtube.com/watch?v=ambwtKT63s0 The next segment is sponsored by Infineon Tech…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025. The myth of a malware-free Mac is a thing of the past. Here’s how Mac threats evolved in 2025 — and what’s coming next. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots. How modern phishing kits use honeypots, cloaking, and adversary-in-the-middle attacks—and how defenders can turn those same tactics against them. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybers…
  continue reading
 
A deep dive into Cron, the five-field scheduler that powers recurring tasks across multi-user systems. We trace its evolution from the brutal minute-by-minute polling of early Unix, through System V’s discrete-event scheduling, to modern standards like Vixie Cron and the OpenCron Patterns Specification—explaining how the leap from “is it time yet?”…
  continue reading
 
We explore the catenary—the true curve of a freely hanging chain and the mathematics it hides. Learn why it isn’t a parabola, how Galileo and Hooke unlocked its secrets, and why flipping the curve turns tension into compression for elegant, efficient arches. From the Gateway Arch to Gaudí’s mosaics, we’ll contrast true suspension curves with bridge…
  continue reading
 
Our most far-reaching principles of physics are not about what changes, but what stays the same: conservation laws. In this episode of the Quantum Foundations Podcast, Dr Chiara Marletto from the University of Oxford explains how such principles enable discovery of new physical phenomena; their central role in thermodynamics; controversies about ho…
  continue reading
 
Based rollups have been floating around Ethereum discourse for a couple years now, but the concept remains confusing even to people who understand rollups generally. The pitch sounds almost contradictory: use Ethereum's decentralized validator set to sequence rollups, but somehow still get the fast, smooth UX of centralized sequencers like Base or …
  continue reading
 
What does it actually take to move beyond AI pilots and turn enterprise ambition into real productivity gains? That question sat at the center of my conversation with Olivia Nottebohm, Chief Operating Officer at Box, and it is one that every boardroom seems to be wrestling with right now. AI conversations have matured quickly. The early excitement …
  continue reading
 
We explore how sharks replace tens of thousands of teeth with a multi-row, multi-series conveyor system, how warmer waters speed turnover, and why fluorapatite enamel makes their teeth incredibly durable. From fossil megalodon teeth to modern biomaterials, we uncover the architecture of apex predation and how this self-renewing toolkit inspires dur…
  continue reading
 
Episode Summary Most security architects are not actually doing architecture. They are doing assurance work, following checklists, and hoping standards will save them. But as systems get more complex and attackers get faster, that approach is no longer good enough. In this episode of Secured, Cole sits down with Ken Fitzpatrick, founder of Patterne…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now. Broken Object Level Authorization (BOLA) is eating the API economy from the inside out. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel. IPv6 breaks digital ad measurement. Learn how IPinfo’s research-driven, active-measurement model restores accuracy across CTV and all channels. Check more stories related to cybersecurity at: https…
  continue reading
 
with @PrimordialAA @rhackett In this episode, host Robert Hackett sits down with Bryan Pellegrino, cofounder and CEO of LayerZero, one of the core infrastructure projects that enables blockchains to talk to one another. We talk about why crypto went multichain, what it means for crypto to compete with legacy financial systems, and a lesson Bryan to…
  continue reading
 
On a black-sand beach, lava collides with ice or seawater to forge hyaloclastite —glass fragments instantly shattered by thermal shock and cemented into palagonite. In this episode we unravel how non-explosive quench fragmentation creates jigsaw-fit textures that freeze the exact moment of contact, how palagonitization turns loose debris into solid…
  continue reading
 
A rigorous yet intimate tour of the 32‑bar song form (AABA) that underpins countless classics. We break down the four eight‑bar sections—three A sections with the same hook, a contrasting B bridge, and a triumphant return—and show how this tight structure creates emotional payoff. From Gershwin’s I Got Rhythm to early rock ’n’ roll and even Doctor …
  continue reading
 
Why does dry sand crumble while a splash of water lets it stand tall? We dive into the granular physics behind sandcastles, exploring capillary bridges, surface tension, and the surprising power of tiny water fractions. Learn about the pendular and funicular regimes, why about 1% water is often optimal, and how compaction strengthens the structure.…
  continue reading
 
A hands-on introduction to compiler construction, emphasizing Java technology and software engineering principles. It guides readers through the process of building and extending a real, functional Java compiler for a Java subset called "j--". The material covers fundamental compiler phases, including lexical analysis (scanning), parsing (syntax-di…
  continue reading
 
Show Notes - https://forum.closednetwork.io/t/episode-50-digital-dictatorships-velvet-glove-coup/170 Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privacy Bad Ass David - Privacy Bad …
  continue reading
 
What happens when the systems we rely on every day start producing more signals than humans can realistically process, and how do IT leaders decide what actually matters anymore? In this episode of Tech Talks Daily, I sit down with Garth Fort, Chief Product Officer at LogicMonitor, to unpack why traditional monitoring models are reaching their limi…
  continue reading
 
In this episode of Cypherpunk'd, I sit down with author Knut Svanholm (Everything Divided by 21 Million) to discuss the terrifying link between central banking and global conflict. We explore the "Consensus Mechanism of Fiat"—World War—and why inflation isn't just an economic annoyance, but a form of modern-day slavery. If you’ve ever wondered why …
  continue reading
 
A friendly, intuitive tour of Hidden Markov Models (HMMs). Using the relatable 'full trash bin means he's home' metaphor, we explore how to infer unseen states from noisy observations, learn the model parameters with Baum–Welch, and decode the most likely state sequence with the Viterbi algorithm. You’ll see how forward–backward smoothing combines …
  continue reading
 
We break down the dew point—what it is, why it matters for your comfort, aviation, and building design—and how engineers estimate it with the Magnus–Tetens and Buck equations. Learn why sensor errors often dominate accuracy, how the gap between air temperature and dew point sets cloud base, and a look at extreme dew-point values. Note: This podcast…
  continue reading
 
Join us as we unpack the NVIDIA Rubin platform—the next-gen AI supercomputer built around extreme co-design. We map the six-chip system (Vera CPU, Rubin GPU, NVLink 6, Connect X9, BlueField 4 DPU) and its groundbreaking bandwidth and efficiency gains, from 3.6 TB/s per GPU to 10x lower inference costs and MOE training with 4x fewer GPUs. We explore…
  continue reading
 
A comprehensive guide to deep learning for web development, specifically with Python. It covers the foundational concepts of machine learning and neural networks, including various types like CNNs and RNNs, and essential terminology such as bias, variance, overfitting, and underfitting. The sources provide practical instruction on building and depl…
  continue reading
 
Are we asking ourselves an honest question about who really owns automation inside a business anymore? In my conversation with Darin Patterson, Vice President of Market Strategy at Make, we explore what happens when speed becomes the default requirement, but visibility and structure fail to keep up. Make has become one of the breakout platforms for…
  continue reading
 
https://mcdn.podbean.com/mf/web/dg2zf2mjiwzy62cg/The_PowerShell_Podcast_episode_208_Ryan_Spletzer66wgr.mp3 Distinguished Software Engineer Ryan Spletzer joins The PowerShell Podcast to talk about building a long-term career in tech through curiosity, continuous learning, and strong community connections. Ryan shares how PowerShell helped shape his …
  continue reading
 
Distinguished Software Engineer Ryan Spletzer joins The PowerShell Podcast to talk about building a long-term career in tech through curiosity, continuous learning, and strong community connections. Ryan shares how PowerShell helped shape his path from early work in SharePoint, automation, and identity management to leading AI initiatives at Autode…
  continue reading
 
Take a journey into how ancient textiles function as living programs. We examine Andean backstrap weaving and Japanese ikat not just as art, but as sophisticated algorithmic systems: from on-the-fly debugging as a weaver adjusts a row, to pre-dyed patterns that compile into the fabric. We connect motifs as macro-operations, recursion in repeating m…
  continue reading
 
We explore Ernst Zermelo's 1913 theorem for two-player, perfect-information, deterministic games. It guarantees that such games are solvable: one side can force a win, or both can force at least a draw. We unpack the non-repetition argument, why it's finite, and how this foundational insight underpins modern game theory, AI, and formal verification…
  continue reading
 
We unpack the core bottleneck in streaming AI: the split between heavy pre-fill computations and fast, memory-light decoding. From chunked prefill to physical separation (DissServe) and logical isolation (DuetServe), we explore how phase isolation eliminates interference, delivering 2x–4.5x better goodput and transforming cost efficiency. Join us a…
  continue reading
 
A detailed guide to web hacking, IT security, and ethical hacking practices. It systematically explores a wide array of vulnerabilities and attack methodologies common to web applications, alongside corresponding defense techniques. The document is structured to educate readers on fundamental web technologies, popular hacking tools, and practical l…
  continue reading
 
Was 2025 the year the games industry finally stopped talking about direct-to-consumer and started treating it as the default way to do business? In this episode of Tech Talks Daily, I'm joined by Chris Hewish, President at Xsolla, for a wide-ranging conversation about how regulation, platform pressure, and shifting player expectations have pushed D…
  continue reading
 
In this episode of Tech Talks Daily, I'm joined by Kiren Sekar, Chief Product Officer at Samsara, to unpack how AI is finally showing up where it matters most, in the frontline operations that keep the global economy moving. From logistics and construction to manufacturing and field services, these industries represent a huge share of global GDP, y…
  continue reading
 
Jacobi’s exact four-square formula makes r4(n) elegant, but five squares lead to deeper territory with half-integral weight forms and L-functions. In this episode we trace Emil Grosswald’s clever reduction of r5(n) to a sum of r4(n), bypassing the circle method to yield a sharp asymptotic, and we unpack the main term, the role of L-series, the cusp…
  continue reading
 
We uncover phantom cities defined by riverine logic: buried systems (medieval rivers and culverted canals), drowned landscapes (post-glacial river basins now submerged), and canalized rivers forgotten in the city’s routine. From Perugia’s 13th-century aqueduct to London’s Lost Rivers and modern restoration efforts, archaeology, geophysics, and proa…
  continue reading
 
A deep dive into cymatics—the study of visible patterns produced by vibration. We trace its history from Hooke's flour-drag experiments on a vibrating plate to Chladni's sand figures, then to Faraday's liquid waves and Hans Jenny's iconic imagery. We explore how a medium's geometry predetermines the possible patterns, how modern engineers use sound…
  continue reading
 
Functions as an all-in-one exam guide for the GPEN certification, covering essential penetration testing methodologies and tools. It includes detailed chapters on reconnaissance, initial access, execution, and reporting, with specific sections dedicated to the Metasploit Framework and PowerShell Empire. The guide emphasizes practical application th…
  continue reading
 
What if airlines stopped thinking in terms of seats and schedules and started designing for the entire journey instead? In this episode of Tech Talks Daily, I'm joined by Somit Goyal, CEO of IBS Software, to talk about how travel technology is being rebuilt at its foundations. Since we last spoke, AI has moved from experimentation into everyday ope…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play