show episodes
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The Stack Overflow podcast is a weekly conversation about working in software development, learning to code, and the art and culture of computer programming. Hosted by Paul Ford and Ben Popper, the series features questions from our community, interviews with fascinating guests, and hot takes on what’s happening in tech. Founded in 2008, Stack Overflow is empowering the world to develop technology through collective knowledge. It’s best known for being the largest, most trusted online commun ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
d
devMode.fm

1
devMode.fm

Andrew Welch, Ryan Irelan

Unsubscribe
Unsubscribe
Monthly+
 
devMode.fm is a bi-weekly podcast dedicated to the tools, techniques, and technologies used in modern web development. We cover JavaScript frameworks like React, Vue.js, and Svelte, tooling like webpack, Docker, Nginx, Next, Nuxt, etc. and CMS systems like Craft CMS.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
S
Self-Hosted

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
Web development discussions and interviews from Peter Fisher. Covering JavaScript, Linux, Docker, PHP, Python, MYSQL, HTML and more Peter Fisher is a freelance web and mobile developer in Gloucestershire UK and the Host of the How To Code Well YouTube channel. If you have any feedback or wish to do a collaboration then please get in touch.
 
Loading …
show series
 
The Enneagram of Personality, or just the Enneagram, is a representation of personalities using a geometric figure, also called an enneagram (little e), to express nine interconnected personality types. While each type is unique it is related to other types through the circle connecting the type to each of it’s wings and the lines or arrows in the …
 
Luke Hoban, CTO of Pulumi, joined host Jeff Doolittle for a conversation about infrastructure as code (IAC), which allows software development teams to configure and control their cloud infrastructure assets using code in contrast to other approaches...By IEEE Computer Society
 
It’s another Potluck! In this episode, Scott and Wes answer your questions about privacy policies, coding for kids, MongaDB hosting, cloud backups, system design, #NoMoreFoo, and much more! Prismic - Sponsor Prismic is a Headless CMS that makes it easy to build website pages as a set of components. Break pages into sections of components using Reac…
 
#129: In this listener question episode, we discuss the different ways to develop microservices: fully local, fully remote and hybrid. What do you think the best way is to develop microservices? YouTube channel: https://youtube.com/devopsparadox/ Books and Courses: Catalog, Patterns, And Blueprints https://www.devopstoolkitseries.com/posts/catalog/…
 
Pick the right tool for the job. But who is picking? What tools can they choose from? And what is the actual job, anyway? This advice is important because it gives you a starting framework to answer some of the most important clarifying questions in any task of significance. 🙏 Today's Episode is Brought To you by: Compiler Compiler is a brand new p…
 
This week we’re joined by Gergely Orosz and we’re talking about the insane tech hiring market we’re in right now. Gergely was on the show a year ago talking about growing as a software engineer and his book The Tech Resume Inside Out. Now he’s laser focused on Substack with actionable advice for engineering managers and engineers, with a focus on b…
 
Welcome to another episode of the Secure Developer! During today’s conversation, Guy Podjarny, founder of Snyk, speaks with Liz Rice, Chief Open-Source Officer with eBPF pioneers Isovalent, where she works on the Cilium project, which provides cloud native networking, observability and security. They touch on plenty of current and relevant topics, …
 
In this episode of The Rabbit Hole, we unpack the recent outages of Facebook's servers, looking at why this might have happened, some of the more ludicrous theories that have been offered as explanations, lessons to take away, and why the downtime was worse than just a day of limited social media access for many people. With Facebook, Whatsapp, and…
 
Mads is a principal program manager on the Visual Studio Team and has published over 150 free Visual Studio extensions. He blogs about anything related to Visual Studio and extensibility, and is a home automation enthusiasts. Links https://twitter.com/mkristensen https://github.com/madskristensen https://www.linkedin.com/in/madskvistkristensen/ htt…
 
The last 15 years have seen the emergence of cloud-based developer APIs and services as dominant components of the developer toolchain. As a result, there has never been more power at developers’ fingertips. But making that power usable and accessible is a challenge that is shared between the providers and the consumers of these services. Google’s …
 
In todays software podcast we are going to talk about development environments. What they are and how development environments differ from a production or testing environment. Kick start your tech career with Amarachi Amaechi's new book Getting Started in Tech: A guide to building a tech career My web development courses ➡️ Learn How to build a Jav…
 
Today's episode is about remote work. Well, sort of. I found someone with a different perspective on remote work and a fantastic story to share, Paul Lutus. I think that he might be the original remote software developer. He left California behind for a lower cost of living in Oregon. And from Oregon, he developed software for Apple. But the kind o…
 
Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to technology. While he had some bumps in th…
 
Chad and Curtis McKinney, Ph. D. (yes, both) call in to discuss Chad’s experience with Cloud Imperium working on Star Citizen and their collaborative indie efforts on Recursive Ruin, a “kaleidoscopic first-person narrative puzzle game” not quite like anything else you’ve likely seen. Video Show https://youtu.be/eg3qoTOxNxc Support our sponsors MANS…
 
Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-comin…
 
REvil’s troubles appear to be the work of an international law enforcement operation. Other gangs have noticed, and they’re looking a little spooked, even as they evolve their tactics in a maturing criminal-to-criminal market. Questions are raised about the efficacy of surveillance tool export controls. Caleb Barlow has cyber security consideration…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, Oct 18-22, is hosted by Rich Stroffolino with our guest, Matthew Southworth, CISO, Priceline Thanks to our episode sponsor, Tessian and the Human Layer Security Summit Want to know what we learned from analyzing 2 million malicious emails? At Tessian’s Human Layer Summit you’l…
 
Hello out there in cyber land. It’s striketober in America. From the John Deere factory floor to the cereal crunching halls of Kellogg's, workers are telling management they’ve had enough. It’s labor unrest the U.S. hasn’t seen in my lifetime. Thankfully today I’m joined by Motherboard Senior Staff writer and expert on all things labor, Lauren Kaor…
 
This week I discuss the importance of claiming your health portal profile, considerations when disclosing online vulnerabilities, and the new threat with voice cloning.Direct support for this podcast comes from sales of my books, services, and online training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponso…
 
This week, Dan Neumann is joined by two AgileThought colleagues, Andrea Floyd and Hal Hogue. In this episode, Dan, Andrea, and Hal are talking about the books that have been influential to them and what they learned from them. Continuous learning is a crucial piece of the work at AgileThought, and this is why today, you are invited to this special …
 
Imagine a world where you own some sort of building whether that’s a grocery store, a restaurant, a factory… and you want to know how many people reside in each section of the store, or maybe how long did the average person wait to be seated or how long did it take the average factory worker to complete their assembly task. Currently today these sy…
 
Cybercrime matures as hackers are forced to work smarter FIN7 tries to trick pentesters into launching ransomware attacks China VPN exposes data for 1M users Thanks to our episode sponsor, Tessian and the Human Layer Security Summit Want to know what we learned from analyzing 2 million malicious emails? At Tessian’s Human Layer Summit you’ll hear a…
 
Symfony has updated their documentation design and it looks pretty slick. Great index page. I think there are some spacing and UX issues but on the whole it’s a welcomed improvement but I do wish it had a search feature. Package typo squatting. A package that has a miss spelled name is being used to trick 300 million websites harmful PHP code I hav…
 
Isaac's piece, Code quality: a concern for businesses, bottom lines, and empathetic programmers, ran recently on the Stack Overflow blog. A simple metric for code quality code be how easy is it to delete any given piece of code. There's no algorithmic way to judge quality code, but experienced engineers know it when they see it. Jeff Atwood's Perfo…
 
Stolen Images Evidence Campaign Pushes Sliver Based Malware https://isc.sans.edu/forums/diary/Stolen+Images+Evidence+campaign+pushes+Sliverbased+malware/27954/ FiveSys Rootkit Signed By Microsoft https://www.bitdefender.com/files/News/CaseStudies/study/405/Bitdefender-DT-Whitepaper-Fivesys-creat5699-en-EN.pdf Oracle Critical Patch Update https://ww…
 
Evil Corp is identified as the operator behind the ransomware that hit the Sinclair Broadcast Group and Olympus. The US Defense Department complains of Russian toleration for ransomware gangs. The Fin7 gang has set up a front company to recruit talent. Betsy Carmelite from Booz Allen Hamilton on building mission-driven 5G security with zero trust. …
 
On October 6, a massive leak of Twitch data revealed how much cash its biggest streamers made. The leak isn’t the first time Twitch’s security has been called into question and as the fallout from the leak spiraled, Motherboard reporter Lorenzo Franceschi-Bicchierai went looking for an older story, the story of Urgent Pizza. This week on Cyber, Lor…
 
The gig economy involves independent contractors engaging in flexible jobs. Today gig workers often get work from centralized platforms that facilitate the process of connecting workers with employers in exchange for a fee. Some workers find the relationship between worker and platform to be adversarial in nature since the platform can establish an…
 
Russian firms see DDoS spike Sinclair hack linked to Russian organization Microsoft expires old Windows updates Thanks to our episode sponsor, Tessian and the Human Layer Security Summit Want to get the latest security insights from Cisco, Forrester, Intercontinental Exchange and Knowbe4? At Tessian’s Human Layer Security Summit you’ll get fresh in…
 
UK Correspondent Carole Theriault returns with an interview with Paul, a spam analyst, Dave and Joe have some follow-up, Joe revisits NFTs with rug pull scams, Dave's story is about phishers using a symbol in place of the Verizon logo, and our Catch of the Day comes from listener Rafael in Spain about a Steam account takeover scam attempt his son e…
 
In the past decade, NoSQL has gone from being an interesting experiment to becoming business critical. We catch up with Martin Fowler and Pramod Sadalage, co-authors of NoSQL Distilled, to understand why the database technology took off and where it’s proven its capabilities in the enterprise and how thinking around issues such as persistence model…
 
Collaboration is key - how do you add it to your applications? Carl and Richard talk to Rickard Hansson about Weavy and their API for adding audio, video, and text to your application. Rickard talks about collaboration with context - making sure you can bring together the right people at the right time to get work done. The conversation also turns …
 
Thanks to Covid 19: New Types of Documents are Lost in the Wild https://isc.sans.edu/forums/diary/Thanks+to+COVID19+New+Types+of+Documents+are+Lost+in+The+Wild/27952/ Google Chrome 95 Released https://chromestatus.com/roadmap Squirrel VM Bug https://thehackernews.com/2021/10/squirrel-engine-bug-could-let-attackers.html BlackByte Decryptor Released …
 
Luke Hoban, CTO of Pulumi, joined host Jeff Doolittle for a conversation about infrastructure as code (IAC), which allows software development teams to configure and control their cloud infrastructure assets using code in contrast to other approaches such as using web interfaces or command line interfaces. Luke described how IAC allows teams to app…
 
The LightBasin “activity cluster” has been active indeed against telecom infrastructure in what looks like an espionage campaign. The Magnitude exploit kit adds capabilities for hitting Chromium browsers. An exploit broker is interested in cloud-based VPNs. Victims continue to pay in ransomware attacks. A hacker gets seven years for conspiracy to d…
 
Why mastering your development environment can be a tricky feat, and a server outage brought to you by the late 1990s. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Datadog: Try Datadog free by starting a your 14-day trial and receive a free t-shirt once you install the agent. A Cloud Guru…
 
Venture capital investment has continued to flow into technology startups. No one builds technology from scratch. There are cloud services, software libraries, 3rd party services, and software platforms that modern entrepreneurs must adopt to build their products efficiently and quickly. These layers of infrastructure are a key area for many invest…
 
Ransomware reports signal lack of preparedness and willingness to pay Acer hacked twice in a week by the same threat actor FCC takes aim at spam texts Thanks to our episode sponsor, Tessian and the Human Layer Security Summit Worried if your security stack is enough for today’s attack landscape? A recent Forrester Consulting study says, Human Layer…
 
Can You Make the Great Chinese Firewall Work For You https://isc.sans.edu/forums/diary/Can+you+make+the+Great+Chinese+Firewall+work+for+you/27948/ Fake Government Assistance Websites https://www.ic3.gov/Media/Y2021/PSA211015 TA505 Coming Back https://www.proofpoint.com/us/blog/threat-insight/whatta-ta-ta505-ramps-activity-delivers-new-flawedgrace-v…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login