show episodes
 
S
Syntax - Tasty Web Development Treats
Series avatar that links to series pageSeries avatar that links to series page

1
Syntax - Tasty Web Development Treats

Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers

Unsubscribe
Unsubscribe
Weekly+
 
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
  continue reading
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
  continue reading
 
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
  continue reading
 
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
  continue reading
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
  continue reading
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
The modern web is changing fast. Front-end frameworks evolve quickly, standards are emerging and old ones are fading out of favor. There are a lot of things to learn, but knowing the right thing is more critical than learning them all. Modern Web Podcast is an interview-style show where we learn about modern web development from industry experts. We’re committed to making it easy to digest lots of useful information!
  continue reading
 
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder.
  continue reading
 
C
Click Here
Series avatar that links to series pageSeries avatar that links to series page

1
Click Here

Recorded Future News

Unsubscribe
Unsubscribe
Weekly
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more stories like Click Her ...
  continue reading
 
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
  continue reading
 
Software engineers, architects and team leads have found inspiration to drive change and innovation in their team by listening to the weekly InfoQ Podcast. They have received essential information that helped them validate their software development map. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 1,200,000 downloads in the last 3 years.
  continue reading
 
Loading …
show series
 
Today we speak with Ellie Huxtable, the creator of a magical open source tool for syncing, searching & backing up your shell history. Along the way we learn all about the sync service, why she likes Rust, the branding / marketing of the project, how she quit her job to work on it full time, the business model & so much more. Leave us a comment Chan…
  continue reading
 
Eddy Vinck, Senior Software Engineer at FrontValue, shares how he uses Astro in his day-to-day development with practical applications. Links https://twitter.com/EddyVinckk https://www.eddyvinck.com https://github.com/EddyVinck https://www.linkedin.com/in/eddyvinck https://substack.com/profile/74566816-eddy-vinck https://youtube.com/channel/eddyvin…
  continue reading
 
In this potluck episode of Syntax, Wes and Scott discuss egress, scraping, Safari EU changes, and answer questions on updating dependencies and SetInterval. Show Notes 00:00 Welcome to Syntax! 01:35 Brought to you by Sentry.io. 02:49 I have over 100,000 user images on Cloudinary. How do I migrate to another service? Cloudflare-Cloudinary Proxy 07:2…
  continue reading
 
As you grow your career, you will continuously lean on delegation to scale your efforts and focus on the most important things. True delegation requires ownership, and ownership can be thought of in two critical parts: agency and responsibility. In today's episode, we discuss the fool's errand of delegating only one or the other of these parts. 🙏 T…
  continue reading
 
Producing 3D films, games and simulations is a complex process, often involving multiple teams and tools. At Pixar, pipeline engineers needed to write lots of glue code to integrate different workflows and file formats, which was a big challenge, and led them to create the Universal Scene Description, or OpenUSD. OpenUSD implements abstract data mo…
  continue reading
 
Rishi Singh, founder and CEO at Sapient.ai, speaks with SE radio’s Kanchan Shringi about using generative AI to help developers automate test code generation. They start by identifying key problems that developers are looking for in an automated test-generation solution. The discussion explores the capabilities and limitations of today’s large lang…
  continue reading
 
Episode Summary In this episode of The Secure Developer, Guy Podjarny and guest Sean Catlett discuss the shift from traditional to engineering-first security practices. They delve into the importance of empathy and understanding business operations for enforcing better security. Catlett emphasizes utilizing AI for generic tasks to focus on crafting…
  continue reading
 
Atila Fassina is a devrel engineer at Crabbula and on the Solid DX team. He is passionate about creating content and in this show we talk about his involvement with SolidJS and developer experiences in general. Rob and Atila discuss how to improve DX, performance optimizations, and the nuances behind developer documentation and how to create a comp…
  continue reading
 
Sam and Ryan discuss the intuition behind React Transitions, and why React’s new useOptimistic hook is a good fit for building a URL-driven filter panel that stays fully responsive to client interactions. Topics include: 0:00 - Intro 1:12 - The problem: In a world of Server Components, URL updates are blocked by a server-side roundtrip 10:44 - Atte…
  continue reading
 
We embrace the dad bod lifestyle and find out if Apple's Vision Pro demo sold Mike, and Chris is picking up on what the Zuck is putting down. Sponsored By: Trusteebook: TrusteeBook - a simple, easy-to-use workbook that helps you take control of your digital legacy. Get started today, and take $10 off. Promo Code: CODER Coder QA: Take $2 a month off…
  continue reading
 
#251: We're becoming more and more dependent on sophisticated systems that transport data from one part of our application to another. This infrastructure, often referred to as message brokers, is a vital backbone supporting many products we use daily. But are we fully leveraging their power and simplicity? In this episode, we speak with Valera Bro…
  continue reading
 
Waymo is an autonomous driving company that had its start as the Google Self-Driving Car Project. David Margines is the Director of Product Management at Waymo and he joins the podcast to talk about Waymo today, the sensing technologies underpinning their cars, the huge impact of AI on their systems in recent years, and more. This episode is hosted…
  continue reading
 
LockBit takedown update Signal now lets users keep phone numbers private NSA Cybersecurity Director Rob Joyce to retire Thanks to today's episode sponsor, Conveyor No more portal scaries. Conveyor just launched AI autofill of OneTrust portal questionnaires. That means no more clicking question-by-question to copy-paste each answer when a customer s…
  continue reading
 
Old Mirai New Exploits https://isc.sans.edu/diary/Mirai-Mirai%20On%20The%20Wall...%20%5BGuest%20Diary%5D/30658 KeyTrap PoC Exploit https://github.com/knqyf263/CVE-2023-50387 Google Open Sources Magika File ID System https://opensource.googleblog.com/2024/02/magika-ai-powered-fast-and-efficient-file-type-identification.html Exploiting Unsynchronised…
  continue reading
 
Wyze breach Microsoft patch Tuesday fixes 15 remote code execution flaws Why are there password restrictions? The Canadian Flipper Zero Ban Security on the old internet Using Old Passwords Passwordless login TOTP as a second factor German ISP using default router passwords Email encryption in transit pfSense Tailscale integration DuckDuckGo's email…
  continue reading
 
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about: LockBit has been taken down by law enforcement Some mega-juicy leaks out of Chinese offsec/APT contractor I-SOON GRU gets its Moobot network shutdown Signal adding usernames is… complicated Much, much more In this week’s sponsor interview Devicie’s …
  continue reading
 
What's coming next for Windows Server? Richard chats with Jeff Woolsey about the latest information around Windows Server vNext! Jeff discusses how customer feedback influences Windows Server and the challenges of moving folks to the latest versions. Server vNext is designed to live in a cloud hybrid world and includes improvements for interacting …
  continue reading
 
Operation Cronos leaves LockBit operations on borrowed time. An alleged leak reveals internal operations from the Chinese Ministry of Public Security. An Israeli airline thwarts communications hijacking attempts. The alleged Raccoon Infostealer operator has been extradited to the US. ConnectWise patches critical vulnerabilities. Schneider Electric …
  continue reading
 
https://youtu.be/3SY1sDF-BA0This week on the podcast we cover Canada's attempt to ban the Flipper Zero. Before that, we review a recent research post on a new class of vulnerability on the Ubuntu operating system. We end the episode with a chat bout a the impacts of artificial intelligence on data security.Menlo Report on Business AI Usage - https:…
  continue reading
 
A surprise disclosure of a national security threat by the House Intelligence chair was part of an effort to block legislation that aimed to limit cops and spies from buying Americans' private data. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
  continue reading
 
Recursion is at the leading edge of applying AI and ML to drug development. The company exemplifies a new wave of “techbio” companies, that tightly couple compute and robotics with biology and chemistry. The task of decoding biology requires vast amounts of biological data and innovative strategies to make use of that data. It also requires close c…
  continue reading
 
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-…
  continue reading
 
An episode from ‘In Machines We Trust’ from MIT Technology Review. How we train fighter pilots—both real and artificial—is undergoing a series of rapid changes. In order for these systems to be useful we need to trust them, but figuring out just how, when and why remains a massive challenge. Jennifer Strong reports on how AI is being used to teach …
  continue reading
 
LockBit disrupted by global police operation Cactus leaks Schneider Electric data on dark web ALPHV gang takes credit for LoanDepot, Prudential attacks Thanks to today's episode sponsor, Conveyor Conveyor, the security questionnaire automation software one of our customers dubbed “my favorite security tool of the year”, is now even better. They’ve …
  continue reading
 
In this week's exploration, I'm delving into the intricate realm of the Master File Table (MFT), a pivotal forensic artifact in Windows investigations. The MFT provides a valuable gateway to decode evidence across various scenarios. Join me in this episode as we unravel the forensic basics, explore diverse use cases, and discover a range of tools t…
  continue reading
 
Andrew has worked in many roles, including as Executive Manager at the Commonwealth Bank of Australia, where he established and grew a platform engineering function that supported 7,000 engineers. You can find him on LinkedIn here. You can learn more about Compass, a developer experience platform, here. Shout to Amelio for earning a stellar questio…
  continue reading
 
Old Mirai New Exploits https://isc.sans.edu/diary/Mirai-Mirai%20On%20The%20Wall...%20%5BGuest%20Diary%5D/30658 KeyTrap PoC Exploit https://github.com/knqyf263/CVE-2023-50387 Google Open Sources Magika File ID System https://opensource.googleblog.com/2024/02/magika-ai-powered-fast-and-efficient-file-type-identification.html Exploiting Unsynchronised…
  continue reading
 
Ship It is back! IEEE Spectrum writes about quantum computing’s reality check, Maxim Dounin announces freenginx, Nadia Asparouhova goes deep on AI & the “effective accelerationism” movement, Angie Byron helps first time open source contributors avoid common pitfalls & Miroslav Nikolov writes up his advice for high-risk refactoring. Leave us a comme…
  continue reading
 
Kathy O’Donnell is the leader of Space Solutions Architecture for AWS Aerospace and Satellite. In this extended conversation, we dive into how AWS is supporting generative AI in the space domain. She walks us through some incredible case studies with AWS customers who are using generative AI and space technologies to improve life here on Earth. Lea…
  continue reading
 
The State of Agile Report, for the first time, has recognized the challenges in delivering success to big enterprise. By the numbers, we can see even practitioners question the ability to scale agile on global stages. GET MY FREE GUIDE TO THE FUTURE OF AGILE! Learn to thrive in 2024 by creating more value and leveraging opportunities that everyone …
  continue reading
 
In this episode, Dave and Jamison answer these questions: I’ve recently started a new Gig as a Senior Developer/Tech Lead at a company where we are our own clients, using the software we develop in-house. I’m encountering a bit of a hiccup, though. Our product owner, is primarily focused on support and doesn’t provide formal Acceptance Criteria. Th…
  continue reading
 
Wes and Scott explore the web standards and email authentication methods that keep your email from going to spam; DMARC, SPF and DKIM. If you send email via a custom domain name, you need to listen to this! Show Notes 00:00 Welcome to Syntax! 01:06 Brought to you by Sentry.io. 02:08 What exactly are SPF, DKIM, and DMARC? 02:53 Different ways that y…
  continue reading
 
For Kevin Mitnick - perhaps the greatest social engineer who ever lived - hacking was an obsession: even though it ruined his marriage, landed him in scary correction facilities and almost cost him his sanity in solitary confinement, Mitnick wasn't able to shake the disease that compelled him to keep breaking into more and more communication system…
  continue reading
 
Show Description Josh (or Jsoh) stops by to talk about his work at Deno, recent blog posts on Copilot, why Svelte is awesome and React is not, Apple and PWA, and building word games on the web. Listen on Website → Guests Josh Collinsworth Guest's Main URL • Guest's Twitter Frontend Engineer at Deno, the maker and designer of the word games Quina, a…
  continue reading
 
Google Chrome feature blocks attacks against home networks Mastermind behind Zeus and IcedID malware pleads guilty Air Canada must honor refund invented by its chatbot, says court Thanks to today's episode sponsor, Conveyor Conveyor AI is so good, it can now autofill OneTrust portal questionnaires in one click. Yes, you heard us right. Conveyor's s…
  continue reading
 
In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Tim Miller, Technical Marketing Engineer for Panoptica, Cisco's Cloud Application Security solution, (Panoptica is the result of Cisco's incubation engine (Outshift) for new products and markets), and Kevin Ford, Esri’s CISO. They discuss the comp…
  continue reading
 
Social media continues to impact us in some way or another. In this episode, we discuss what platforms we use and what value we get from them. We share our thoughts on what the future of social media might look like.Panelists:Ryan Burgess - @burgessdryanJem Young - @JemYoungAugustus Yuan - @augburtoShirley Wu - @sxywuEpisode transcript: https://www…
  continue reading
 
SolarWinds Security Advisories https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2023-2-3_release_notes.htm Google Chrome Adds Private Network Checks https://chromestatus.com/feature/4869685172764672 Gold Factory iOS Trojan https://www.group-ib.com/blog/goldfactory-ios-trojan/…
  continue reading
 
We have a different combination of the hosts for this episode where we continue the series on the types of database systems available and why you might choose one over another. Michael continues impressing by recalling everything we’ve ever said on our 500+ hours of podcasts, Allen enjoys learning about a database system he’d never come across, and…
  continue reading
 
The need to properly secure Entra ID tenants has been made pretty obvious this year thanks to a large-scale attack on them by Russia’s SVR intelligence agency. In this interview Andy Robbins from SpecterOps, the maker of Bloodhound Enterprise, talks through how he thinks those attacks actually went down, about how if you’re an o365 customer you’re …
  continue reading
 
Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for…
  continue reading
 
Jamie Tanna (who has a website) joins us to discuss the indie web, living with ADHD, sharing his salary history with the world & building DMD – a dynamite open source tool to help you better understand the use of dependencies across your org. Leave us a comment Changelog++ members get a bonus 16 minutes at the end of this episode and zero ads. Join…
  continue reading
 
Loading …

Quick Reference Guide