show episodes
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
 
Level-up Engineering reveals actionable management secrets from some of the most successful engineering leaders (VP of Engineering, Director of Engineering, CTO). This podcast brings you key insights from fellow engineering managers, to level-up your management skills and to take your software development team to the next level. The podcast covers the biggest challenges engineering leaders face, showing exactly how others overcame these challenges. Learn the best practices on management and ...
 
The Testing Show - covering everything related to software testing. Our panel of software testing experts will break down and analyze new tools, methodologies, trends and more. With a new episode every two weeks, you'll be sure to get your testing fix. The Testing Show is sponsored by QualiTest. Deploy Software that You and Your Customers Trust with QualiTest Software Testing and Business Assurance Services.
 
Channel 9 is a community. We bring forward the people behind our products and connect them with those who use them. We think there is a great future in software and we're excited about it. We want the community to participate in the ongoing conversation. This is the heart of Channel 9. We talk about our work but listen to the customer.
 
Network Collective is a community-focused network engineering podcast. Our episodes bring knowledge and insights of industry experts, pioneers, and peers to wherever you are. Topics range from protocol deep-dives to career management, but through a lens of what is relevant and valuable today. We get engineering because we are engineers. You can find all of our content at our website: https://networkcollective.com
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
 
Hosted on the www.embedded-computing.com website as well as iTunes, Google Play, Spotify, Stitcher, and Alexa, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers and software developers. Each week, embedded industry veterans Rich Nass, Brandon Lewis, and Perry Cohen of Embedded Computing Design tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, and other technology marketplaces in a light and acc ...
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Loading …
show series
 
The traveling salesman problem is a classic challenge of finding the shortest and most efficient route for a person to take given a list of destinations. This is one of many real-world optimization problems that companies encounter. How should they schedule product distribution, or promote product bundles, or define sales territories? The answers t…
 
Natural Language Processing (NLP) is a branch of artificial intelligence concerned with giving computers the ability to understand text and spoken words. “Understanding” includes intent, sentiment, and what’s important in the message. NLP powers things like voice-operated software, digital assistants, customer service chat bots, and many other acad…
 
Daniel Roth, program manager at Microsoft discusses Blazor a technology from dotnet to build interactive UIs. Host Priyanka Raghavan quizzed Daniel on the need for Blazor and how it compares with other client side rendering technologies like Angular and React. Daniel deep dived into the different components of Razor including Razor pages, how blazo…
 
Alex Bramley continuous his conversation with Sven Johann SRE Workbook Implementing Service Level Objectives by Alex Hidalgo The Calculus of Service Availability Art of SLO Workshop) Google Customer Reliability Engineering blog Consequences of SLO violations Applying the escalation policy An example escalation policy Chapters: [00:00:15.00] Welcome…
 
In this SEI Podcast, the latest in the “My Story in Computing” series, which explores the unique paths people take into the field of computing, David Zubrow discusses his path from a PhD in applied history and social sciences and an administrative position at Carnegie Mellon University to a career as a manager and technical leader at the SEI.…
 
Modern applications are increasingly built as large, distributed systems. A distributed system is a program where its components are located on different machines that communicate with one another to create a single cohesive app. Components may exist as multiple instances across “nodes,” the computers hosting them, which form clusters of nodes that…
 
Encryption algorithms provide the means to secure and transfer sensitive information by taking input and transforming it into an unreadable output. Usually a special key, or multiple keys, are needed to unscramble the information back to the original input. These algorithms power the security of everything from our cell phone lock screens to Fortun…
 
A liquid market enables individuals or groups to quickly buy and sell assets. Decentralized platforms can struggle to execute trades when their platform does not have much liquidity for a specific token. Newer tokens or tokens with limited supply are most often the least liquid because there might be an imbalance of buyers and sellers. You can’t se…
 
Let us discuss the complexity behind this trojan hack, the multi-layer approach of hiding the RAT (remote access trojan) is absolutely genius. https://en.wikipedia.org/wiki/HTML_Application https://en.wikipedia.org/wiki/Portable_Network_Graphics https://blog.malwarebytes.com/malwarebytes-news/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-f…
 
The traveling salesman problem is a classic challenge of finding the shortest and most efficient route for a person to take given a list of destinations. This is one of many real-world optimization problems that companies encounter. How should they schedule product distribution, or promote product bundles, or define sales territories? The answers t…
 
The traveling salesman problem is a classic challenge of finding the shortest and most efficient route for a person to take given a list of destinations. This is one of many real-world optimization problems that companies encounter. How should they schedule product distribution, or promote product bundles, or define sales territories? The answers t…
 
Colonial Pipeline shuts down some systems after a ransomware attack, disrupting refined petroleum product delivery in the Eastern US. We’ll check in with Sergio Caltagirone from Dragos for his analysis. Other ransomware attacks hit city and Tribal governments. Joint UK-US alert on SVR tactics issued, and the SVR may have changed its methods accordi…
 
In this show, I go into detail on how HAProxy achieved 2 million HTTP requests per second. This is a very well-written article that discusses how the HAProxy team benchmarked the product on a 64 core ARM machine leading to over 2 million requests per second. There are many components and low-level points that I try to elaborate on, timestamps below…
 
The previous episode's audio had a bit of a hiccup - this one is fixed. Sorry about that! On today's episode, I interview a personal hero of mine in the podcasting world, Katy Milkman. Katy is the host of Choiceology, a podcast about why and how we make the choices we make. Katy also just released a brand new book, How To Change - be sure to check …
 
In this episode, Dave and Jamison answer these questions: Questions This question came with a delightful ASCII-art diagram that I will now dictate as follows: “pipe space space space space” JK TLDR: I want to move up the ranks but I’m not sure what might await me… except meetings. What should I expect? And how do I get there? Too Small, Want MOAR!I…
 
Welcome to Iteration, a podcast about programming, development, and design. John Intro — My name is John and I am a software developer for a home services startup. JP Intro — Hi, I'm JP and I am a software developer. What makes a good 1:1 (IC perspective)? JP a manager who listens JP clear action items for problems What makes a good 1:1 (Manager pe…
 
As you build your career, it’s helpful to think about your personal brand and how you promote yourself in the industry. In this episode, we are joined by Alice Lee, to talk with us about how each of us approach branding and self-promotion.Guests:Alice Lee - @byaliceleePanelists:Ryan Burgess - @burgessdryanAugustus Yuan - @augburtoJem Young - @JemYo…
 
Good security gets out of the way of users while getting in the way of adversaries. Passwords fail on both accounts. Users feel the pain of adhering to complex password policies. Adversaries simply copy, break, or brute-force their way in. Why, then, have we spent decades with passwords as the primary factor for authentication?From the very first t…
 
VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spre…
 
In this show, I discuss why we have 3 data models in database systems, OLTP (Online Transactional Processing) OLAP (Online Analytical Processing), and HTAP (Hybrid Transactional Analytical Processing). I’ll also explain the difference between them, the use of ETL tools (extract transform load) to load data from transactional to analytical databases…
 
In this podcast Shane Hastie, Lead Editor for Culture & Methods, spoke to Victor Nuṅez about how systemic team coaching helps teams perform more effectively and the importance of trusting teams as generative, creative and inteligent systems.Read a transcript of this interview: https://bit.ly/3xVIjHaSubscribe to our newsletters:- The InfoQ weekly ne…
 
Microservice architecture has become very common over the past few years because of the availability of containers and container orchestrators like Kubernetes. While containers are overall positive for scaling apps and making them more available, they’ve also introduced hurdles like persisting data and state, and container restarts or pod failures.…
 
Microservice architecture has become very common over the past few years because of the availability of containers and container orchestrators like Kubernetes. While containers are overall positive for scaling apps and making them more available, they’ve also introduced hurdles like persisting data and state, and container restarts or pod failures.…
 
Microservice architecture has become very common over the past few years because of the availability of containers and container orchestrators like Kubernetes. While containers are overall positive for scaling apps and making them more available, they’ve also introduced hurdles like persisting data and state, and container restarts or pod failures.…
 
Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group. In late 2020, Secureworks® Counter Threat…
 
Natural Language Processing (NLP) is a branch of artificial intelligence concerned with giving computers the ability to understand text and spoken words. “Understanding” includes intent, sentiment, and what’s important in the message. NLP powers things like voice-operated software, digital assistants, customer service chat bots, and many other acad…
 
Natural Language Processing (NLP) is a branch of artificial intelligence concerned with giving computers the ability to understand text and spoken words. “Understanding” includes intent, sentiment, and what’s important in the message. NLP powers things like voice-operated software, digital assistants, customer service chat bots, and many other acad…
 
Natural Language Processing (NLP) is a branch of artificial intelligence concerned with giving computers the ability to understand text and spoken words. “Understanding” includes intent, sentiment, and what’s important in the message. NLP powers things like voice-operated software, digital assistants, customer service chat bots, and many other acad…
 
This week Elixir creator José Valim joins Jerod and Practical AI’s Daniel Whitenack to discuss Numerical Elixir, his new project that’s bringing Elixir into the world of machine learning. We discuss why José chose this as his next direction, the team’s layered approach, influences and collaborators on this effort, and their awesome collaborative no…
 
CISA outlines the FiveHands ransomware campaign. Circumstantial evidence suggests that some cybergangs are either controlled by or are doing contract work for Russian intelligence services. US Federal agencies turn their attention to software supply chain security. Scripps Health continues its recovery from cyberattack. Insecure home routers in the…
 
On this week's episode of the AI Show Live with Seth Juarez, Tony Xing joins the show to talk about the latest multivariate capabilities with Anomaly Detector. Stay tuned after the segment as Seth gets back to work on his Roshambo game. Jump to: [00:17] Seth welcomes Tony [00:49] What is Anomaly Detector? [01:30] New to Anomaly Detector: Multivaria…
 
Continuous learning is essential, but is reliant on access to that knowledge. How can we help our community learn in challenging times? Check out this episode of Less Code More Power where we meet Matthew Perren, a Microsoft Business Central Consultant, and hear how he took his passion for books AND learning, taught himself the Power Platform, and …
 
Following on from our Earth Day episode on green software engineering, we turn to the concept of Green Cloud. Reducing your IT operations’ carbon footprint is more complex than simply moving to the cloud. We explore how developers can gain insights into the energy usage of their cloud operations and the tools and techniques they can deploy to minim…
 
Chuck was on a strategic call with one of his potential coaching clients talking about cryptocurrencies and realized that this is one of the major reasons that people want to become influencers. Or, rather, that many people aspire to make a difference and/or make money and the best way to do that is to become the person people go to for what you do…
 
De’Aira Bryant is a doctoral student in the School of Interactive Computing at the Georgia Institute of Technology. Her research areas span the fields of human-robot interaction and artificial intelligence. Recently she programmed a report for the HBO movie "Superintelligence." She talks to Scott about how robots and can cater to specific audiences…
 
In this interview Jenny talks to multiple Emmy award winning journalist Kerry Tomlinson who gives a masterclass in why hard work, discipline and professionalism pays off. We want to thank Kerry for her amazing work and a brilliant interview! To follow Kerry on LinkedIn, click this link here. To follow Kerry on Twitter, click here for the link to he…
 
This week we discuss Red Hat’s open source strategy, public cloud adoption and Signal’s Instagram ads. Plus, advice on setting your thermostat. Rundown Red Hat Red Hat open-sources StackRox Kubernetes security product Red Hat Delivers Full GitOps CI/CD Built on Tekton and Argo RHEL, RHEL, RHEL, fancy that: Rocky Linux would-be CentOS replacement hi…
 
Some possible insight into what a Chinese cyberespionage unit is up to. Hackathons, from Beijing to Washington (the one sponsored by Beijing developed an iPhone zero-day used against China’s Uyghurs). Panda Stealer is after crypto wallets. Microsoft's Kevin Magee reflects on lessons learned in the last year. Our own Rick Howard speaks with Todd Nei…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login