Rpc public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
RPC Ramblings

Richhill Presbyterian Church

Unsubscribe
Unsubscribe
Monthly
 
RPC Ramblings is a Podcast by Richhill Presbyterian Church. Over the next few weeks, we'll be chatting about responding to, living in, and life after Covid-19, seeing what God has to say about it all through His Word. Grab your coffee and join us for a chat.
  continue reading
 
Navigate the complexities of the tax world with RPC’s Taxing Matters podcast. This is a monthly podcast series designed for professionals and business leaders seeking insights into the often-complex world of tax. Whether you’re a seasoned professional, a business owner, or just curious about tax, our podcast brings you expert insights into the ever-changing tax landscape. Join our podcast host and Senior Associate in RPC's Tax Disputes team, Alexis Armitage, alongside monthly special guests, ...
  continue reading
 
Artwork

1
Huddy At The RPC

John Huddy Hudson

Unsubscribe
Unsubscribe
Monthly
 
This is Huddy At the RPC Podcast! I talk about life challenges, mortgages, debt, finance, credit and a whole other world of topics including mixed martial arts, books I've read, and kids in the world today! I'm a variety, mixed bag and full of Irish blood! Support this podcast: https://podcasters.spotify.com/pod/show/huddy-at-the-rpc/support
  continue reading
 
Credit expert / nerd chatting about credit, mortgage loans, real estate. Educate and inspire from a dude that's lives it and breaths it! 20 years of experience not just in business but life.
  continue reading
 
A podcast all things RPC Authority since there are already too many SCP Podcasts. What this podcast will be about: As previously stated all things RPC. Just like some of you might be I'm fairly new to the Authority myself. So let us explore this anomalous world together while drawing comparisons to the older universes of weirdness.
  continue reading
 
Artwork

1
AI and the Law

39 Essex Chambers

Unsubscribe
Unsubscribe
Monthly
 
In this series, 39 Essex Chambers’ barristers, Katherine Apps KC and David Mitchell interview each other and guests exploring the legal issues raised by artificial intelligence including what sort of legal regulation is needed, how AI will impact on the legal profession, discrimination challenges, data protection, intellectual property and ownership, contracting issues and the impact on legal education in the future. Guest include: Baroness Shami Chakrobarti CBE, former shadow Attorney Gener ...
  continue reading
 
When the clutter, motherhood, relationships, and life seem too overwhelming. When you have resentment and frustration every day – this is a sign you have been living on auto-pilot- letting life happen to you instead of living it ON PURPOSE. I’ve been there. Three kids under 4 and I decided to declutter my home and realized I was living my whole life on autopilot. I wanted more. I wanted to take action, be more present, have more fun! Enjoy my kids! I’m Shawna, You might know me as your Nerdy ...
  continue reading
 
Artwork

1
Unruly Software

Unruly Software

Unsubscribe
Unsubscribe
Monthly
 
Join hosts James and Frank for a humorous and informative podcast about the world of software and development. In each episode, we discuss the latest trends and challenges in the tech industry, sharing our own experiences and insights as software engineers. We cover a wide range of topics, including testing, best practices, microservices, monorepos, cloud computing, devops, infrastructure as code, and more. Tune in to "Unruly Software" for a fresh perspective on the world of software enginee ...
  continue reading
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Joins us in the trenches of web3. Deep dive in technical topics. Look behind the marketing curtain. Reports & interview with people building in the trenches of web3. Unhinged rants about culture & politics, economics, philosophy. Stories of founders whose achievement are beyond believe. Weekly news & markets update. Little bit of this, little bit of that and whole lotta fun! LFG !
  continue reading
 
Artwork

1
dev3

Dawson Botsford

Unsubscribe
Unsubscribe
Monthly
 
Web3 and crypto are taking the world by storm. Keeping up-to-date can feel impossible. Dev3 solves this with technical conversations. Learn about Ethereum, DeFi, and the newest tech from the web3 builders making it happen.
  continue reading
 
Welcome to The Fearfic Podcast, where talking Basement goo Slimebeast, inebriated interstellar traveler Abysmii, and irritable ghostly creep Dead Palette, read all stories horror and Internet related, paragraph by paragraph, and mess around while they do it. From adolescent revenge fantasies to subtle post modern narratives about real life events, and everything in between, we read it and critique.
  continue reading
 
Aspiring to succeed in finance? Danny Camm spent 6 years working in finance and now operates as a specialist finance recruiter in London. Each week, Danny will speak to guests ranging from middle management up to the C-suite to establish what it takes to achieve success in finance. www.successinfinance.co.uk
  continue reading
 
Artwork

1
Mergermarket Radio

Mergermarket Podcast

Unsubscribe
Unsubscribe
Monthly
 
A must listen for those interested in gaining unique insight into comprehensive M&A. Unlike the competition, Mergermarket provides market-leading proprietary intelligence with a focus on origination. This actionable information enables firms to track the strategic intentions of potential and existing clients, and be the first to know of any relevant M&A developments. Tune in to listen to professionals speak about the latest information on the biggest movers and shakers in the industry!
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/last-mile-of-blockchains-rpc-and-node-as-a-service. This paper surveys methods for accessing blockchains, comparing full nodes and third-party services based on integrity, availability, and privacy. Check more stories related to programming at: https://hackernoon.com/c/pro…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/keyword-based-anomaly-detection-in-log-files. Spring-based suites are utilized to build a log anomaly detection system. This is a three-part series, with the foundation components covered in the first part. Check more stories related to programming at: https://hackernoon.c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-open-source-ai-is-good-for-developers-meta-and-the-world. Open source will ensure that more people around the world have access to the benefits and opportunities of AI, that power isn’t concentrated in the hands of a Check more stories related to programming at: https:…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
Modern appsec isn't modern because security tools got shifted in one direction or another, or because teams are finding and fixing more vulns. It's modern because appsec is meeting developer needs and supporting the business. Paul Davis talks about how AI is (and isn't) changing appsec, the KPIs that reflect outcomes rather than being busy, and the…
  continue reading
 
The CISO role has been evolving for 20 years, but the last 2 years have accelerated that evolution. Some might say it's evolving into extinction. What are the factors driving this evolution? Allan Alford, CEO at Alford and Adams Consulting and host of The Cyber Ranch Podcast, joins Business Security Weekly to discuss this evolution and some of the …
  continue reading
 
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
  continue reading
 
Identity, the security threat that keeps on giving. For the 17th year in a row, identity is one of the top threats identified in the Verizon DBIR. Why? Dor Fledel, Senior Director of Product Management at Okta and Co-Founder of Spera, joins Business Security Weekly to discuss the challenges of identity and how to solve them. From numerous disparate…
  continue reading
 
In today’s show we spend time with Daniela Uribe, a global entrepreneur, shoe designer, and content creator who launched her own namesake luxury footwear brand, Daniela Uribe. The Daniela Uribe line embodies her distinctive style along with her electrifying personality and her striking designs that incorporate technological comfort with a sensual, …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/css-positions-real-examples-to-help-you-learn. Let's start with even do you need CSS positions aren't the other properties enough to make you faint? Why CSS positions?Say you want to create an navigation.. Check more stories related to programming at: https://hackernoon.co…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-6-six-side-projects-i-created-over-this-weekend. Open to learn why and how I built it and what is my growth plan for them. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also check exclusive content about #web-development, #…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/augmented-tree-data-structures. Data structures are a serious tool to store data conveniently. Modern applications have the flexibility to organize the data in the memory or on disk using vari Check more stories related to programming at: https://hackernoon.com/c/programmi…
  continue reading
 
This week, on Enterprise Security Weekly, we've got: Identity Security gets more funding Wiz walks away BlackHat Announces Startup Spotlight Finalists Crowdstrike post mortem Simple Security Tricks are the Best Security Tricks Splitting the CISO role Web scraping for AI is out of control SEC vs Solarwinds Vaping the Internet Show Notes: https://sec…
  continue reading
 
Edward Wu thinks so! Understandably so, as his startup, Dropzone.ai is making a big bet on generative AI to change the face (and pace) of security operations. We'll talk about what has changed here, and I have so many questions: after many generations of AI/ML technology in security, is the current gen really that dramatically different? Dropzone i…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
The emergence of generative AI has caused us to rethink things on two fronts: how we consume threat detection data, as defenders how we need to shift our thinking and approaches to prepare for attackers' newfound GenAI capabilities But wait - is GenAI even useful for defenders or attackers? We'll dive deep into the state of AI as it pertains to sec…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-build-a-request-access-approval-system-using-nextjs. Learn how to build an efficient Request Access Approval System using Next.js and Permit.io for managing permissions securely and effectively Check more stories related to programming at: https://hackernoon.com/c/p…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/10-leetcode-patterns-to-solve-1000-leetcode-problems. Ever wondered how to master 1000 LeetCode problems in six months? You have a shortcut. By learning these ten patterns, you can solve LeetCode easily. Check more stories related to programming at: https://hackernoon.com/…
  continue reading
 
Segment description coming soon!The Crowdstrike incident: what happened and what we can do better, people forget what 0-Day really means, shutting off the heat in January, honeypot evasion and non-functional exploits, what not to use to read eMMC, what if we don't patch DoS related vulnerabilities, a CVSS 10 deserves its own category, port shadow a…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/code-review-culture-why-you-need-to-have-one. Code review culture is important to avoid friction in your team and bugs in code. As reviewers, you want to avoid personal style comments (aka nitpicks) Check more stories related to programming at: https://hackernoon.com/c/pro…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/event-bus-in-microservice-architecture-with-rabbitmq-and-python. An “Event bus” is a design pattern that enables different parts of a software system to communicate with each other by publishing and subscribing events. Produc Check more stories related to programming at: h…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Show Notes: https://securityweekly.com/psw-836…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/aosp-and-linux-cross-border-convergence-look-at-openfde-new-open-source-linux-desktop-environment. Open Fusion Desktop Environment is a new Linux desktop environment design exploration project, similar to KDE and GNOME. Check more stories related to programming at: https:/…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-to-build-your-own-todo-list-service-with-golang-and-mongodb. Many have wondered how a simple task sheet or applications that provide such functionality work. In this article, we will write a small TODO service. Check more stories related to programming at: https://hack…
  continue reading
 
Security is a risk management discipline. No one understand that more than Jeff Recor. Jeff has built risk management practices for Deloitte, Grant Thornton, and Accenture and has recently formed his own risk consulting practice. In this unscripted interview, Jeff will share his insights on the evolution of security as a risk management discipline,…
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Generative AI has produced impressive chatbots and content generation, but however fun or impressive those might be, they don't always translate to value for appsec. Allie brings some realistic expectations to how genAI is used by attackers and can be useful to defenders. Segment resources: https://www.forrester.com/blogs/generative-ai-will-not-ful…
  continue reading
 
Loading …

Quick Reference Guide