Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Signaling Theory cuts through crypto’s noise to find the real signals. Host Rex Kirshner joins builders, thinkers, and researchers who are shaping the space for deep, nuanced and informed conversations. Curiosity first, signal over noise.
…
continue reading
Story
…
continue reading
Welcome to Energy Bytes with John Kalfayan and Bobby Neelon. Your essential guide to the intersection of data and energy. This podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unparalleled perspective on th ...
…
continue reading
Intellectually Curious is a podcast by Mike Breault featuring over 1,600 AI-powered explorations across science, mathematics, philosophy, and personal growth. Each short-form episode is generated, refined, and published with the help of large language models—turning curiosity into an ongoing audio encyclopedia. Designed for anyone who loves learning, it offers quick dives into everything from combinatorics and cryptography to systems thinking and psychology. Inspiration for this podcast: "Mu ...
…
continue reading
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users — whether artists, coders, creators, developers, companies, organizations, or communities — now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. From ...
…
continue reading
PowerShell Community
…
continue reading
Welcome to Cypherpunk’d, where we explore the intersection of privacy, technology, and personal freedom in the digital age. Hosted by Matty Ice, this podcast delves into the challenges posed by government surveillance and big tech’s intrusion into our lives. We bring you thought-provoking conversations with thought leaders, authors, computer scientists, Bitcoiners, entrepreneurs, and human rights activists who are at the forefront of the digital resistance. Each episode cuts through the nois ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Zero Knowledge is a podcast which goes deep into the tech that will power the emerging decentralised web and the community building this. Covering the latest in zero knowledge research and applications, the open web as well as future technologies and paradigms that promise to change the way we interact — and transact — with one another online. Zero Knowledge is hosted by Anna Rose Follow the show at @ZeroKnowledgefm (https://twitter.com/zeroknowledgefm) or @AnnaRRose (https://twitter.com/Ann ...
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
The official podcast of the Satoshi Nakamoto Institute
…
continue reading
Conversations with Web3 builders about what they're working on right now. Topics include: Ethereum, EVM, Solidity, blockchain programming and indexing, L2 scaling solutions, zero knowledge, multi-party computation, cryptography, NFTs, crowdfunding, blockchain art, onchain performance art, and building networks and community. Subscribe with your favorite podcast app https://web3galaxybrain.com
…
continue reading
a pseudorandomly-timed podcast about digital security, cypherpunks, cryptography, internet freedom, and miscellaneous topics! RSS: http://feeds.soundcloud.com/users/soundcloud:users:156877463/sounds.rss
…
continue reading
Applications of Quantum Computing 1. Cryptography Quantum computers have the potential to break traditional encryption methods, prompting the development of quantum-resistant cryptographic algorithms. 2. Optimization Quantum computing excels in solving complex optimization problems, such as logistics, supply chain management, and financial modeling. https://kek.co/product/buy-youtube-views/
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
Welcome to Tech 'n Savvy! April is a software engineer, and Emily is a quantum computing and cryptography consultant. Listen in as we explore topics in technology and global issues important to us.
…
continue reading
Sure, you already know all about computer science, physics, mathematics, yadda yadda yadda. But can you explain it to your boss in terms that won't explode his managerial head? More importantly, can you use your big, bulging brains to land dates? No, seriously? Okay, then. Intellectual Icebergs is for you. Join us, semi-weekly-to-monthly, as we explore topics ranging from cryptography and subatomic physics to geek dating tips and partyology. Intellectual Icebergs: helping to reveal the geek ...
…
continue reading
Close your eyes and let the universe unfold. Sleep with Science is a nightly invitation to explore the quiet wonder of the natural world. Through calm, unhurried narration, we transform complex scientific ideas into soothing stories that ease your mind and spark gentle curiosity. From the vast patterns of astronomy to the elegant code of DNA, each episode offers a soft passage into topics like physics, biology, geology, helping you learn while you unwind. Perfect for thoughtful minds and res ...
…
continue reading
A podcast hosted by Blockchain Israel, the largest community in Israel dedicated to Blockchain Solutions and Crypto Technologies. We'll be bringing thought leaders across industries to hear about their insights and input on how blockchain and crypto and its potential to disrupt industries. Our featured topics: Blockchain · Bitcoin · Cryptocurrency · Smart Contracts · Digital Currency · Virtual Currency · Decentralization · Cryptography · Decentralized Systems · Smart Property
…
continue reading
HerHax Podcast was founded by a group of women who are passionate about the field of cybersecurity and want to spread the word about everything cyber! From the history of women in cryptography to modern day workplace tips, how to stay safe online or how to pwn your way to the top of the CTF scoreboard, come listen to our podcast and join our Discord Channel!
…
continue reading
A security podcast is hosted by Professor William (Bill) Buchanan OBE, a world-renowned Information security professional and educator. Join Bill as he interviews and discusses the state-of-the-art with esteemed guests from all corners of the security industry. From cryptologists to technologists, each guest shares a wealth of experience and knowledge.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
🎙️ In The Clouds: The First d/acc Podcast Exploring the intersection of technology, human agency, and our collective future through the lens of defensive accelerationism (d/acc). Join Hunter and Sam as we dive deep into emerging technologies, digital sovereignty, and how we can preserve human agency while embracing technological progress. 🔍 We cover: - AI and superintelligence - Digital sovereignty - Brain-computer interfaces - Cryptography and privacy - Decentralized systems - Cybernetics a ...
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
1
en clair: forensic linguistics, literary detection, language mysteries, and more
Dr Claire Hardaker
en clair is a podcast about forensic linguistics, literary detection, language mysteries, cryptography, codes, language and the law, linguistic crime, undeciphered languages, and more, from past to present. Credits, links, podcast transcripts and more in the Case Notes: wp.lancs.ac.uk/enclair
…
continue reading
The PowerShell Podcast is a weekly show about building your career with PowerShell. Each episode features the tips, tech, and modules that make PowerShell the premier automation and scripting tool for IT professionals. Join us as we interview PowerShell experts to discover what makes PowerShell and its community so amazing and awesome.
…
continue reading
Podcast about science in Luxembourg and beyond - in every episode we have a look at the latest scientific research and technological changes in Luxembourg or we discuss it with scientists or researchers working in Luxembourg. This is a podcast for people who love science, but aren't necessarily science graduates. We post a new episode every second week.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Entertaining & Sarcastic Podcast about dramatic stories on cyber and AI, which actually help people and organizations protect themselves online and stop cybercrime. Find all content at www.CyberCrimeJunkies.com and videos on YouTube & Rumble @CyberCrimeJunkiesPodcast Dive deeper with our newsletter on LinkedIn and Substack. THE CHAOS BRIEF.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
What does quantum physics tell us about reality? What progress have we made since the days of Einstein and Schrödinger, and what problems are today’s quantum research scientists trying to solve? This podcast aims to share a modern perspective on the most fundamental aspects of quantum theory, informed by up-to-date research insights. In each episode, I interview an active researcher about a topic related to their work, with the discussion aimed to be broadly accessible.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
1
The IACR Can't Decrypt with Matt Bernhard
56:49
56:49
Play later
Play later
Lists
Like
Liked
56:49The International Association of Cryptologic Research held their regular election using secure voting software called Helios…and lost the keys to decrypt the results, leaving them with no choice but to throw out the vote and call a new election. Hilarity ensues. We welcome special guest Matt Bernhard who actually works on secure voting systems to e…
…
continue reading
1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
50:44
50:44
Play later
Play later
Lists
Like
Liked
50:44Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
…
continue reading
1
Post-Quantum Cryptography: Why Your Encryption Has a 5-Year Shelf Life
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40This story was originally published on HackerNoon at: https://hackernoon.com/post-quantum-cryptography-why-your-encryption-has-a-5-year-shelf-life. RSA encryption faces quantum threat by 2030. Learn why your encrypted data has a 5-year shelf life and how to migrate to quantum-safe cryptography. Check more stories related to cybersecurity at: https:…
…
continue reading
1
World-leaders in Cryptography: Giuseppe Ateniese
1:34:41
1:34:41
Play later
Play later
Lists
Like
Liked
1:34:41Giuseppe is a Professor, Eminent Scholar in the Cybersecurity and CCI Faculty Fellow in the Department of Computer Science and the Department of Cyber Security Engineering at George Mason University. He has advanced many areas of research, including proxy re-encryption, anonymous communication, two-party computation, secure storage, and provable da…
…
continue reading
1
Violence | Knut Svanholm: Everything Divided By 21 Million | Episode 8 of 12
27:01
27:01
Play later
Play later
Lists
Like
Liked
27:01In this episode of Cypherpunk'd, I sit down with author Knut Svanholm (Everything Divided by 21 Million) to discuss the terrifying link between central banking and global conflict. We explore the "Consensus Mechanism of Fiat"—World War—and why inflation isn't just an economic annoyance, but a form of modern-day slavery. If you’ve ever wondered why …
…
continue reading
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security. In this conversation, host David Mauro engages with …
…
continue reading
1
Hidden Markov Models Made Simple: From Trash Cans to Hidden States
5:24
5:24
Play later
Play later
Lists
Like
Liked
5:24A friendly, intuitive tour of Hidden Markov Models (HMMs). Using the relatable 'full trash bin means he's home' metaphor, we explore how to infer unseen states from noisy observations, learn the model parameters with Baum–Welch, and decode the most likely state sequence with the Viterbi algorithm. You’ll see how forward–backward smoothing combines …
…
continue reading
1
Dew Point Demystified: The Quiet Meter Behind Comfort, Clouds, and Condensation
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51We break down the dew point—what it is, why it matters for your comfort, aviation, and building design—and how engineers estimate it with the Magnus–Tetens and Buck equations. Learn why sensor errors often dominate accuracy, how the gap between air temperature and dew point sets cloud base, and a look at extreme dew-point values. Note: This podcast…
…
continue reading
1
NVIDIA Rubin: Extreme Co-Design and the Invisible AI Infrastructure
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51Join us as we unpack the NVIDIA Rubin platform—the next-gen AI supercomputer built around extreme co-design. We map the six-chip system (Vera CPU, Rubin GPU, NVLink 6, Connect X9, BlueField 4 DPU) and its groundbreaking bandwidth and efficiency gains, from 3.6 TB/s per GPU to 10x lower inference costs and MOE training with 4x fewer GPUs. We explore…
…
continue reading
1
3544: Make: No-Code, Automation and AI agents In One Visual Platform
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47Are we asking ourselves an honest question about who really owns automation inside a business anymore? In my conversation with Darin Patterson, Vice President of Market Strategy at Make, we explore what happens when speed becomes the default requirement, but visibility and structure fail to keep up. Make has become one of the breakout platforms for…
…
continue reading
1
New Ways to Take Control Over Data Privacy with Kurt Long.
56:23
56:23
Play later
Play later
Lists
Like
Liked
56:23Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work a…
…
continue reading
https://mcdn.podbean.com/mf/web/dg2zf2mjiwzy62cg/The_PowerShell_Podcast_episode_208_Ryan_Spletzer66wgr.mp3 Distinguished Software Engineer Ryan Spletzer joins The PowerShell Podcast to talk about building a long-term career in tech through curiosity, continuous learning, and strong community connections. Ryan shares how PowerShell helped shape his …
…
continue reading
1
Threads as Code: Weaving, Recursion, and the Dawn of Computation
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03Take a journey into how ancient textiles function as living programs. We examine Andean backstrap weaving and Japanese ikat not just as art, but as sophisticated algorithmic systems: from on-the-fly debugging as a weaver adjusts a row, to pre-dyed patterns that compile into the fabric. We connect motifs as macro-operations, recursion in repeating m…
…
continue reading
1
PowerShell to Distinguished Engineer with Ryan Spletzer
1:12:03
1:12:03
Play later
Play later
Lists
Like
Liked
1:12:03Distinguished Software Engineer Ryan Spletzer joins The PowerShell Podcast to talk about building a long-term career in tech through curiosity, continuous learning, and strong community connections. Ryan shares how PowerShell helped shape his path from early work in SharePoint, automation, and identity management to leading AI initiatives at Autode…
…
continue reading
1
Zermelo's Theorem: The First Formal Game Theory Result
4:42
4:42
Play later
Play later
Lists
Like
Liked
4:42We explore Ernst Zermelo's 1913 theorem for two-player, perfect-information, deterministic games. It guarantees that such games are solvable: one side can force a win, or both can force at least a draw. We unpack the non-repetition argument, why it's finite, and how this foundational insight underpins modern game theory, AI, and formal verification…
…
continue reading
1
Goodput, Not Just Throughput: Prefill, Decode, and Rethinking AI Inference
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23We unpack the core bottleneck in streaming AI: the split between heavy pre-fill computations and fast, memory-light decoding. From chunked prefill to physical separation (DissServe) and logical isolation (DuetServe), we explore how phase isolation eliminates interference, delivering 2x–4.5x better goodput and transforming cost efficiency. Join us a…
…
continue reading
1
3543: From App Stores to Ownership, Xsolla on Gaming's D2C Turning Point
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Was 2025 the year the games industry finally stopped talking about direct-to-consumer and started treating it as the default way to do business? In this episode of Tech Talks Daily, I'm joined by Chris Hewish, President at Xsolla, for a wide-ranging conversation about how regulation, platform pressure, and shifting player expectations have pushed D…
…
continue reading
1
3542: Samsara on Scaling Human Expertise With AI, Not Replacing It
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21In this episode of Tech Talks Daily, I'm joined by Kiren Sekar, Chief Product Officer at Samsara, to unpack how AI is finally showing up where it matters most, in the frontline operations that keep the global economy moving. From logistics and construction to manufacturing and field services, these industries represent a huge share of global GDP, y…
…
continue reading
1
Don't Get Tricked. Don't Skip These Two Steps. That's It
2:18
2:18
Play later
Play later
Lists
Like
Liked
2:18Most cybercrime doesn’t start with genius hackers. It starts on a Tuesday. Someone’s busy. An email feels urgent. And a decision gets made five seconds too fast. Fear-based cybersecurity training hasn’t made people safer. It’s made them tired. Most cyber attacks don’t start with genius hackers. They start with rushed decisions, social engineering, …
…
continue reading
1
Phantom Rivers: The Hidden Waterways that Built Our Cities
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52We uncover phantom cities defined by riverine logic: buried systems (medieval rivers and culverted canals), drowned landscapes (post-glacial river basins now submerged), and canalized rivers forgotten in the city’s routine. From Perugia’s 13th-century aqueduct to London’s Lost Rivers and modern restoration efforts, archaeology, geophysics, and proa…
…
continue reading
1
Cymatics: The Visible Geometry of Sound Waves
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41A deep dive into cymatics—the study of visible patterns produced by vibration. We trace its history from Hooke's flour-drag experiments on a vibrating plate to Chladni's sand figures, then to Faraday's liquid waves and Hans Jenny's iconic imagery. We explore how a medium's geometry predetermines the possible patterns, how modern engineers use sound…
…
continue reading
Jacobi’s exact four-square formula makes r4(n) elegant, but five squares lead to deeper territory with half-integral weight forms and L-functions. In this episode we trace Emil Grosswald’s clever reduction of r5(n) to a sum of r4(n), bypassing the circle method to yield a sharp asymptotic, and we unpack the main term, the role of L-series, the cusp…
…
continue reading
1
3541: How IBS Software Sees AI Redefining Airline Retail and Loyalty
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13What if airlines stopped thinking in terms of seats and schedules and started designing for the entire journey instead? In this episode of Tech Talks Daily, I'm joined by Somit Goyal, CEO of IBS Software, to talk about how travel technology is being rebuilt at its foundations. Since we last spoke, AI has moved from experimentation into everyday ope…
…
continue reading
1
MoneroTopia Episode 246! | Price, News & MUCH MORE!
3:39:59
3:39:59
Play later
Play later
Lists
Like
Liked
3:39:5947e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate GUEST LINKS: TIMESTAMPS Coming soon! NEWS SEGMENT LINKS: SPONSORS: PRICE REPORT: https://exolix.com/ GUEST SEGMENT: https://cakewallet.com & https://monero.com NEWS SEGMENT: https://www.wizardswap.io XMR…
…
continue reading
1
Protecting Identities - Best Practices and Fraud Prevention
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview 02:49 Shining a Light on the Victim's Perspective 10:00 Creating a Seamless User Experience 12:23 The Role of Behavioral Biometrics in Fraud Detection 15:16 Distinguishing Between Legitimate Users and Cyber Criminals 20:06 The E…
…
continue reading
1
Fusion's Midas Touch: Transmuting Mercury into Gold in the Nuclear Age
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58We explore a provocative claim that next‑generation fusion plants could use 14.1 MeV neutrons to transmute mercury-198 into gold while breeding tritium and funding clean energy. This episode breaks down the physics of neutron-induced transmutation, the engineering hurdles of isotope separation and materials compatibility, and the economics of a mul…
…
continue reading
A deep dive into recursive language models (RLMs) that avoid the context bottleneck by keeping massive context in an external symbolic workspace. The root LLM acts as an active researcher and manager, writing and running code in a REPL to interrogate the context, delegating subtasks to sub-LLMs, and using tools like searches and regex to prune data…
…
continue reading
A deep dive into how an orb web’s radial spokes and logarithmic spiral create a resilient, damage-tolerant architecture. We explore the math of load distribution, the role of pre-stressing, and how this natural blueprint inspires biomimicry—from advanced fabrics and protective gear to nanoscale tubes and space-ready structures. Note: This podcast w…
…
continue reading
1
3540: Hill Climbers, Where Tech, Fitness, and Human Connection Meet
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25What happens when a podcast stops being something you listen to and becomes something you physically show up for? In this episode of Tech Talks Daily, I wanted to explore a different kind of tech story, one rooted in community, endurance, and real human connection. I was joined by Sam Huntington, a Business Development Officer at Wells Fargo, who h…
…
continue reading
1
Stop Taking Bad Advice. An Open Letter To The World
2:18
2:18
Play later
Play later
Lists
Like
Liked
2:18We’ve trained people to fear nation-state hackers…while getting breached by rushed clicks and skipped updates. Cybercrime doesn’t win because it’s smart. It wins because people are tired. We’ve been trained to panic about rare, cinematic attacks… while leaving the front door unlocked every single day. The boring truth that actually works: • Don’t g…
…
continue reading
1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zo…
…
continue reading
1
The Illusion of Security: How IAM Anti-Patterns Sneak into Every System
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42This story was originally published on HackerNoon at: https://hackernoon.com/the-illusion-of-security-how-iam-anti-patterns-sneak-into-every-system. IAM isn’t security by default. Learn how common IAM anti-patterns create false confidence, enable breaches, and how to fix them before it’s too late. Check more stories related to cybersecurity at: htt…
…
continue reading
1
Bezier Curves: The Hidden Geometry Behind Smooth Digital Motion
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27A deep dive into the math and history of Bézier curves, from Sergei Bernstein’s polynomials to De Casteljau’s algorithm. Learn how endpoint interpolation and control-point handles create the smooth curves that power fonts, graphics, robotics, and animation—and how this ancient geometry underpins modern efficiency and elegant motion. Note: This podc…
…
continue reading
1
Brusselstown Ring: Ireland’s Lost Proto-Urban City
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27LiDAR and photogrammetry reveal Brusselstown Ring as a vast Bronze Age–Iron Age hill-fort spanning two hilltops with over 600 micro-topographical features—hundreds of roundhouse platforms—suggesting a densely planned settlement of 2,000–3,500 people. The discovery of a monumental cistern and extensive communal infrastructure challenges the view tha…
…
continue reading
1
Marble Berry: The Spiral of Blue Beauty in Pollia condensata
5:02
5:02
Play later
Play later
Lists
Like
Liked
5:02A deep dive into Pollia condensata, the marble berry, whose electric blue hue arises not from pigment but from nanoscale architecture. We uncover how densely layered cellulose microfibrils form a twisted photonic crystal that reflects a narrow blue band through Bragg reflection, with cell-to-cell pitch variations creating a mosaic of blue, green, a…
…
continue reading
1
3539: ShelterZoom CEO on Keeping Care Moving When Systems Go Down
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54What happens to patient care when hospital systems suddenly go dark and clinicians are forced back to pen and paper in the middle of a crisis? In this episode of the Tech Talks Daily Podcast, I speak with Chao Cheng-Shorland, Co-founder and CEO of ShelterZoom, about a problem that many healthcare leaders still underestimate until it is too late. As…
…
continue reading
1
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving …
…
continue reading