Best computers software podcasts we could find (Updated July 2018)
Related podcasts: Software Technology Computer Software Development Programming C Computing Tech Hardware Cloud Security Computers Games Java Information Education Defined Service Infrastructure Objective  
Computers software public [search 0]

No series here

Try another search?

Why not explore the catalogue? Broken tape
Loading …
 
In today's podcast, we hear about the spread of Magnibur ransomware. LabCorp discloses "suspicious activity" on its networks. The Pentagon will add cybersecurity checks to its test and evaluation process. Siemens updates customers on Spectre and Meltdown. Oracle's quarterly patch bulletin is out. Fallout, clarifications, and more fallout from t ...…
 
Gimbals have had use in compasses, aircraft, rocket engines, astrology, still photography and film/video. We already talked about it in ep021. The dji Ronin-S is a handheld gimbal for cameras up to 3.6kg that is in a price range that makes it attractive even to ambitious amateurs. (Follow-up from ep025: Lightform Projection Mapping)…
 
In today's podcast we review fallout from the Trump-Putin summit. Cyberespionage campaigns resurface in East Asia—at least one of them originates in North Korea. Telefonica sustains a major data breach of Spanish customers' details. Passwords to DVRs are found cached in an IoT search engine. Those DVRs' firmware is also vulnerable to exploitati ...…
 
The workflow of a software developer has evolved a lot throughout the decades. With these advancements we have become more productive and focus on building things that are core to the business that we work on. Simina Pasat, Senior Program Manager at Microsoft, explains what developer productivity consists of. We talked about the developing pipe ...…
 
DNI says "warning lights are blinking red" over cyber threats. Election interference remains a risk despite lower than expected levels of threat activity. Presidents Trump and Putin meet in Helsinki. Notes on the Mueller investigation and the GRU indictments. Huawei, under suspicion over African cyberespionage, is said to be excluded from parti ...…
 
We continue digging into Rob Conery’s The Imposter’s Handbook as Joe explains Florida time, Allen likes greedy algorithms, and Michael shares his geography knowledge. Sponsors Airbrake.io/CodingBlocks – Try Airbrake *free* for 30 days _and_ get 50% off the next 3 months! Survey Says Anonymous Vote Sign in with Wordpress What is your most produc ...…
 
We continue digging into Rob Conery’s The Imposter’s Handbook as Joe explains Florida time, Allen likes greedy algorithms, and Michael shares his geography knowledge. Sponsors Airbrake.io/CodingBlocks – Try Airbrake *free* for 30 days _and_ get 50% off the next 3 months! Survey Says Anonymous Vote Sign in with Wordpress What is your most produc ...…
 
Ondrej Balas is using Blockchain. This episode is sponsored by Smartsheet. Show Notes: Blockchain I mentioned the Coase Theorem, because I wanted an excuse to put my MBA to use. Bitcoin is perhaps the most popular currency that uses blockchain. There are a couple different uses of the term "key frame" in video. I think Ondrej was referring to i ...…
 
Ondrej Balas is using Blockchain. This episode is sponsored by Smartsheet. Show Notes: Blockchain I mentioned the Coase Theorem, because I wanted an excuse to put my MBA to use. Bitcoin is perhaps the most popular currency that uses blockchain. There are a couple different uses of the term "key frame" in video. I think Ondrej was referring to i ...…
 
Andy Bochman is senior grid strategist for Idaho National Lab’s National and Homeland Security directorate. Today we’re discussing the research the INL has been doing, developing new approaches to protecting mission critical systems. The CyberWire's Research Saturday is presented by the Hewlett Foundation Cyber Initiative. Thanks to our sponsor ...…
 
In today's podcast, we hear that Special Counsel Mueller has secured an indictment of twelve Russian intelligence officers for hacking during the 2016 US presidential elections. Ukraine finds VPNFilter in a water treatment facility. Comment spam returns. Speculative execution issues. Mobile-device-management tool used against smartphone users i ...…
 
In this episode, Dirk is joined by Ben Kanelos and Leslie Loy about megagames, also known as large scale simulation event with up to hundreds of participants.
 
We spoke with Kathleen Tuite (@kaflurbaleen) about augmented reality, computer vision, games with a purpose, and meetups. Kathleen’s personal site (filled with many interesting projects we didn’t talk about) is SuperFireTruck.com. Kathleen works for GrokStyle, a company that lets you find furniture you like based on what you see. GrokStyle is u ...…
 
In today's podcast, we hear that Timehop has released more information as its breach investigation proceeds. The case will be interesting as an indicator of what GDPR enforcement will look like. Two speculative execution side-channel attacks are described (in the lab, but not yet, it's believed, in the wild). The US Senate's flesh creeps over b ...…
 
In today's podcast we hear reports that the Ticketmaster breach is the tip of a big software supply chain iceberg. Chinese intelligence services closely interested in Cambodia's elections. iOS crashes appear related to code designed to block displays of Taiwan's flag to users in China. Congress wants some answers on smartphone privacy from both ...…
 
In this episode, the lion, the witch and the wardrobe! BackBites iTalk iTalk Premium Lin Fei Apps Recorder (Free) Recorder Pro 4 in 1 Bundle 2 in 1 Bundle Mac Spacebar Preview Available in Windows 10 Seer Pro Seer Pro on Microsoft Store QuickLook Scary Banana Messages ChatBites The Surface Pro is Everything the MacBook Pro Should Be The Surface ...…
 
A while back, Hasselblad announced a new camera with 400 MegaPixels. More recently, Fujifilm announced the Instax SQ6. What happens when you pit them against each other? Can one of these systems claim to be more The Future of Photography than the other? How should we judge? What do you think?
 
In today's podcast, we hear that advance fee scams run by Elon Musk impersonators are using the recently rescued boys' soccer team as phishbait. Bancor wallet robbed of crytpocurrencies. Palestinian police spearphished. BlackTech espionage group using stolen certificates to sign malware. Apple's upgrades are out—one privacy enhancement has a wo ...…
 
Technology is a broad field that touches many other fields. Camille Eddy, Mechanical Engineer explained different areas in technology that she has worked on. We begin the discussion with machine learning. Camille explained different machine learning systems we interact with, how bias can be present in these systems, and ways to combat it. We th ...…
 
In today's podcast, we hear that if your nation's team was playing a World Cup match, you probably weren't visiting dodgy websites. Concerns mount in the UK that Russia may be readying a long-expected attack on British infrastructure and holding it until the Cup is decided. The Australian National University is hacked in an apparent espionage a ...…
 
Cassandra Faris is using social media. This episode is sponsored by Smartsheet. Show Notes: Social networks discussed: Instagram Snapchat Facebook Twitter LinkedIn Incidentally, these are all great place to tell your friends that you listen to this podcast! Book: To Sell Is Human by Dan Pink Book: The Speed of Trust by Stephen M. Covey Conferen ...…
 
Cassandra Faris is using social media. This episode is sponsored by Smartsheet. Show Notes: Social networks discussed: Instagram Snapchat Facebook Twitter LinkedIn Incidentally, these are all great place to tell your friends that you listen to this podcast! Book: To Sell Is Human by Dan Pink Book: The Speed of Trust by Stephen M. Covey Conferen ...…
 
Series 4 Episode 2 - In this episode we welcome a guest speaker Maurizio who speaks to us about LVM, 3D modelling software Sweet Home 3D, Mark speaks about the coder dojo he is running in Kilkishen, Wayne installs Cockpit on Ubuntu Server, more amazing under the hood tips and an Irish saying in this fortnights episode, have a listen...…
 
Sellers of malware on Dark Web forums often use No Distribute malware scanning tools to help verify the effectiveness of their wares, while preventing legitimate virus scanning tools from adding the malware to their database. Daniel Hatheway is a Senior Security Analyst at Recorded Future, and he takes us through their recently published resear ...…
 
In today's podcast we hear about catphishing in Berlin and Tel Aviv: whether you're offering payment for a white paper or up-to-date futbol scores, it pays to know the right bait. Android apps may be permission hogs, but it's surprising how often the hogs hoard like misers, never really using them. The US Army pushes cyber into the brigades. Ho ...…
 
Katie Malone (@multiarmbandit) works in data science, has podcast about machine learning, and has a Phd in Physics. We mostly talked about machine learning, ways to kill people, mathematics, and impostor syndrome. Katie is the host of the Linear Digressionspodcast (@LinDigressions). She recommended the Linear Digressions interview with Matt Mig ...…
 
In today's podcast we hear about some catphishing in the IDF's pond. Charming Kitten uses itself as bait. Facebook and Google face scrutiny over sharing users' information with third-parties. The Pirate Bay is back after its hiatus, and it's back to cryptojacking. The European Parliament voted today to reopen debate on its controversial copyrig ...…
 
Cardboard as a visual maker tool. Video: Adam Savage on discovering cardboard. Make Magazine cardboard projects. Cardboard furniture. Cardboard teleprompter. Google Cardboard. Nintendo Labo. Google AIY (Vision Kit). Jollylook cardboard camera for Fuji Instax.
 
In today's podcast we hear that Ukraine has warned of hybrid warfare during UN counter-terrorism meetings. ProtonMail DDoS continues. Security concerns surrounding ZTE, Huawei, and China Mobile. Retail data breaches. A quiz app's backup data are accessed by unauthorized parties. FBI, FTC, and SEC sift through Facebook's answers to questions for ...…
 
When we open Netflix we get pretty good recommendations for content that we may like. This is one example that shows the data-driven mentality at Netflix. Julie Pitt, Director of Machine Learning Infrastructure at Netflix, explained other ways in which Netflix is using data and machine learning. We talked about using data for creating content, ...…
 
In today's podcast we hear a bit about the data breach Adidas disclosed late last week. Facebook answers Congressional questions for the record and adopts a data abuse bounty program. Investigation of the Exactis data exposure incident continues, but the class action lawsuits have already begun. Algonquin College discloses a hacking incident. T ...…
 
Steve Hicks is speaking at conferences. This episode is sponsored by Smartsheet. Show Notes: Mailing list: Technically Speaking by Chiu-Ki and Cate Speaking.io Cream City Code conference in Milwaukee THAT Conference Steve Hicks is on Twitter. Want to be on the next episode? You can! All you need is the willingness to talk about something techni ...…
 
Steve Hicks is speaking at conferences. This episode is sponsored by Smartsheet. Show Notes: Mailing list: Technically Speaking by Chiu-Ki and Cate Speaking.io Cream City Code conference in Milwaukee THAT Conference Steve Hicks is on Twitter. Want to be on the next episode? You can! All you need is the willingness to talk about something techni ...…
 
ITO Compass, Untangle, SyncCenter, Windows 10 help, Exchange help, WordPress (29 minutes) Sponsors – Try Instant Housecall Today Free for 15 Days! (use code: MikeTechShow) Malwarebytes Toolset Show #659 Notes Help support the show – Donations for The Mike Tech Show Support the show with this Amazon link Show Links – Untangle Things to check whe ...…
 
ITO Compass, Untangle, SyncCenter, Windows 10 help, Exchange help, WordPress
 
By ProgrammingThrowdown@gmail.com (Patrick Wheeler and Jason Gauci).
 
By ProgrammingThrowdown@gmail.com (Patrick Wheeler and Jason Gauci).
 
Researchers from Cisco Talos continue to track malware they've named VPNFilter, a multi-stage infection with multiple capabilities, targeting consumer-grade routers. Craig Williams is head of Cisco Talos Outreach, and he joins us with the details. The CyberWire's Research Saturday is presented by the Hewlett Foundation Cyber Initiative. Thanks ...…
 
In today's podcast we hear that Ticketmaster UK's hacking incident will provide an interesting GDPR test case. Data aggregator Exactis left nearly two terabytes of personal and business information exposed on the publicly accessible Internet. NSA destroys telephone call data collected in ways it can't square with applicable law. California hast ...…
 
This week, we spoke with Addie (@atdiy) and Whisker (@whixr), the Toymakers (@Tymkrs). Their latest CypherCon badges included a complete phone system. For more information, check out the user documentation at hackthebadge.com or the related Reddit post. There is a video of Joe Grand’s 2018 CypherCon talk if you’d like to watch him talk about hi ...…
 
In today's podcast we hear that Ukraine has warned that Russia is preparing a coordinated attack against Ukrainian financial and energy infrastructure. China appears to be stepping up surveillance of the Tibetan diaspora. Cisco's Talos unit has a free decryptor for Thanatos ransomware. Facebook's self-audit of data usage proves both more diffic ...…
 
https://inverseatascii.files.wordpress.com/2018/06/1632_010.mp3 Podcast Download: E010 This episode features the time from April 1988 through June 1988. The hardware of focus is the Atari CDAR504 CD-ROM. Links Atari ST Wiki: https://en.wikipedia.org/wiki/Atari_ST Atari CDAR504 YouTube video: https://www.youtube.com/watch?v=X2bWcy6pZWY CD Wiki: ...…
 
Web and mobile applications can become more popular than we had anticipated. If we’re not prepared, our application can have downtime. If we are prepared, it means that our application can scale. Scaling an application comes with numerous challenges. One of those is how we reason about system performance and how that influences architecture cha ...…
 
Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her article tracking Nigerian email scammers. Thanks to ...…
 
Remote work stories, More Windows 10 update woes, Fog Project, WiFi and Ethernet (36 minutes) Sponsors – Try Instant Housecall Today Free for 15 Days! (use code: MikeTechShow) Malwarebytes Toolset Show #658 Notes Video for Show #658 Help support the show – Donations for The Mike Tech Show Support the show with this Amazon link Show Links – Fab’ ...…
 
Remote work stories, More Windows 10 update woes, Fog Project, WiFi and Ethernet
 
In today's podcast, we hear that ProtonMail was hit this morning by an Apophis Squad DDoS attack. Rancor cyberespionage campaign observed in Southeast Asia. PythonBot serves up adware and cryptojacking. WannaCry-themed protection racket is all bark and no bite. EU organizing a joint cyber incident response force. FBI and international partners ...…
 
On this week's episode of The Threatpost Podcast, editor Lindsey O'Donnell sits down with Marten Mickos, the CEO of popular bug bounty program platform HackerOne. Mickos sounds off on the opportunities - and growing pains - of bug bounty programs.By chris@threatpost.com (Mike Mimoso, Chris Brook).
 
It’s the marmite of sensors - you either love it or hate it. We are of course talking about the Fujifilm X-Trans sensor. Some say it delivers mushy detail and others say it has beautiful rendering. Occasionally there is common ground where most people think Lightroom does a not-great job on the raw files. But what’s this? Another new Fuji camer ...…
 
In today's podcast, we hear warnings of Russian cyber operations from Romania and the UK. Recent attempts at developing international rules of conduct (and conflict) in cyberspace. Bronze Butler's naughty USB drives—not as scary as they sound, but a useful reminder of some sound precautions. FireEye says it never hacked back. Smart batteries ma ...…
 
Google login Twitter login Classic login