A weekly Python podcast hosted by Christopher Bailey with interviews, coding tips, and conversation with guests from the Python community. The show covers a wide range of topics including Python programming best practices, career tips, and related software development topics. Join us every Friday morning to hear what's new in the world of Python programming and become a more effective Pythonista.
…
continue reading
Welcome to "Teaching Python Podcast,” the go-to podcast for anyone interested in the intersection of education and coding. Hosted by Kelly Paredes and Sean Tibor, this podcast dives into the thrills and challenges of teaching middle school computer science through the engaging and versatile Python programming language. About the Hosts: Kelly Paredes brings a wealth of global experience in curriculum design and currently inspires sixth and eighth graders at Pine Crest School in Fort Lauderdal ...
…
continue reading
The podcast about Python and the people who make it great
…
continue reading
The Pybites Podcast is a podcast about Python Development, Career and Mindset skills. Hosted by the Co-Founders, Bob Belderbos and Julian Sequeira, this podcast is for anyone interested in Python and looking for tips, tricks and concepts related to Career + Mindset. For more information on Pybites, visit us at https://pybit.es and connect with us on LinkedIn: Julian: https://www.linkedin.com/in/juliansequeira/ Bob: https://www.linkedin.com/in/bbelderbos/
…
continue reading
Welcome and thanks for joining us on The Crexi Podcast, an insider’s look at all things commercial real estate. The Crexi Podcast connects CRE professionals with industry insights built for smart decision-making. In each episode, we explore the latest trends, innovations and opportunities shaping commercial real estate, because we believe knowledge should move at the speed of ambition and every conversation should empower professionals to act with greater clarity and confidence.
…
continue reading
A biweekly podcast on the Django Web Framework by Will Vincent and Carlton Gibson.
…
continue reading
Storied is a podcast that tells stories about faith and failure. And sometimes it recounts stories that are so ridiculous that they seem more fitted to Monty Python than to real life. So, listen in to learn about the past, to enjoy a good story, and to know more than you did before.
…
continue reading
The DevLab Podcast (by hackajob) is your backstage pass into the world of today’s leading tech professionals. We talk to developers, engineers, product managers, CTOs, and more from some of the most innovative companies in the UK and US. If you’re building a career in tech, this is where you’ll find the stories, skills, and strategies that matter. Each episode brings you real journeys, technical know-how, and actionable insights to help you grow your craft and your career.
…
continue reading
A podcast. About a book. With an author. Interviewed. Reading from said book.
…
continue reading
The Inspiring Computing podcast is where computing meets the real world. This podcast aims to trigger your curiosity by talking to proficient and advanced users of MATLAB, Python, Julia who use these tools to deepen their understanding of the world, simulate, explore trade-offs and gain insights that help companies add more value. In addition to proficient users we will also talk with the product marketing, toolbox authors, package developers and library maintainers to see what drives the de ...
…
continue reading
A bite-sized tech podcast for busy developers where we’ll briefly cover technical topics, new snippets, and more in short time blocks. Your host, Jennifer Reif, is an avid developer and problem-solver with special interest in data, learning, and all things technology.
…
continue reading
The Like A Farmer Podcast is where legendary stories meet the heart of rural America. Hosted by Pat Spinosa and supported by part-owner Josh Allen, every episode dives into grit, growth, and the great outdoors. From music stars like Riley Green and Uncle Kracker to sports icons like JB Mauney and John Daly, we explore how today’s biggest names battled adversity and built their success from the dirt up. Whether it’s farming, ranching, hunting, fishing, sports, country music, or food culture, ...
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
Welcome to Season Two of Data Chatter. The podcast is hosted by Karthik Shashidhar, cofounder and CEO of Babbage Insight. Apart from this, he is a blogger, newspaper columnist, book author and a former data and strategy consultant. In this season, Karthik Shashidhar talks to business leaders about all things data - how they get insight from data, their frustrations with data teams, what they expect, and how they imagine AI to transform the data insight space. You can follow him on twitter at ...
…
continue reading
Luke's English Podcast is an award-winning podcast for learners of English. Listen, learn and have fun while picking up natural British English as it really is spoken. http://teacherluke.co.uk Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Meet the people shaping open-source across Europe and beyond! Have you ever wondered who the people are behind the open source technologies you use every day? Behind the Commit explores the stories and technologies shaping open source across Europe—from the tools being built to the challenges of maintaining them in a constantly evolving ecosystem. We speak with maintainers about what they're building, why it matters, and how open source is changing in the age of AI.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
The Art of Network Engineering blends technical insight with real-world stories from engineers, innovators, and IT pros. From data centers on cruise ships to rockets in space, we explore the people, tools, and trends shaping the future of networking, while keeping it authentic, practical, and human. We tell the human stories behind network engineering so every engineer feels seen, supported, and inspired to grow in a rapidly changing industry. For more information, check out https://linktr.e ...
…
continue reading
Along the treacherous Borgo Pass In the mountains of Transylvania, a meek English real estate agent is on a harrowing journey to meet a new and mysterious client...who also just happens to be the most terrifying and ferocious monster the world has ever known. COUNT DRACULA!! Christopher Sieber leads an all-star cast, including John Stamos, Annaleigh Ashford, Laura Benanti, Alex Brightman, James Monroe Iglehart, Richard Kind, Rob McClure, Ashley Park, Alan Tudyk, Kathy Fitzgerald, Jeff Kready ...
…
continue reading
We don't always have an hour or so to spare. In this new, short-form podcast, Alex and Matt interview an author, gameshow style, and they have fifteen minutes on the clock to convince you to buy their new book. With a minute to go, the alarm sounds and your hosts will throw out the meanest, saddest comment they think the internet will come up with about the book and the author gets a chance to respond. Patreon members get extra time: 15 more minutes in which you get to see behind the scenes ...
…
continue reading
Trino Community Broadcast is a show where we cover events and happenings within the open-source Trino community and show off some cool stuff about Trino. Learn more at https://trino.io
…
continue reading
I'm Daliana Liu, an ex-Amazon data scientist turned career coach and content creator. I left my tech job to do this "career" thing on my own terms. This is Daliana’s Game — a podcast for tech professionals ready to carve out their own path, and create a career that aligns with their lifestyles. Ever felt you want more fulfillment and freedom beyond the 9-to-5? You’re in the right place. I share more about my career adventure and the lessons I learned with 20k subscribers, join here: https:// ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Bottle of Brown (BOB) Podcast: Candid Conversations for the Mid-Life Crowd Feeling lost in the chaos of adulting? Welcome to the podcast that gets you. We’re a bunch of Xennials navigating the wild terrain of mortgages, parenting, careers, and keeping our sense of humor intact. Each episode is like hanging out with your closest friends – minus the judgment, plus a metaphorical (or literal) drink in hand. What We’re About: - Real talk about modern midlife challenges - Unfiltered discussions o ...
…
continue reading
Talk is Cheap, Show me the Data” is a captivating podcast that delves into the world of evidence-based discussions, where we separate fact from fiction and seek the truth through rigorous analysis. Join us as we navigate through a diverse range of topics, from science and technology to politics and culture, with a sharp focus on uncovering the hard facts behind the narratives. Hosted by passionate advocates for critical thinking and data-driven decision-making, this podcast aims to challenge ...
…
continue reading
1
Exploring Quantum Computing & Python Frameworks
50:24
50:24
Afspil senere
Afspil senere
Lister
Like
Liked
50:24What are the recent advances in the field of quantum computing and high-performance computing? And what Python tools can you use to develop programs that run on quantum computers? This week on the show, Real Python author Negar Vahid discusses her tutorial, “Quantum Computing Basics With Qiskit.” Negar digs into the fundamentals of quantum computer…
…
continue reading
Django 6.0 Released blog post and release notes Deprecations Don't Work for Python Libraries Django Forum - Should We Adjust Django's Versioning? django-repl and django-bolt Template Fragments essay on HTMX.org django-tasks What's New in Django 6.0 by Adam Johnson DjangoCon Europe 2024 | Empowering Django with Background Workers Sponsor This episod…
…
continue reading
1
Automating Incident Response: How to Reduce Malware Forensics Time by 99% with Python and VirusTotal
5:03
5:03
Afspil senere
Afspil senere
Lister
Like
Liked
5:03This story was originally published on HackerNoon at: https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal. Build a pipeline that aggressively removes "Safe" files using three layers. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
…
continue reading
1
The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the Web
6:57
6:57
Afspil senere
Afspil senere
Lister
Like
Liked
6:57This story was originally published on HackerNoon at: https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web. Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
INE Earns G2 Winter 2026 Badges Across Global Markets
4:35
4:35
Afspil senere
Afspil senere
Lister
Like
Liked
4:35This story was originally published on HackerNoon at: https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. Check more stories related to cybersecurity at: https://ha…
…
continue reading
1
The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline
8:45
8:45
Afspil senere
Afspil senere
Lister
Like
Liked
8:45This story was originally published on HackerNoon at: https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline. Louvre heist and how the simple password is not the story. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
1
Greylan James on Kenny Chesney, Singing with Peyton Manning, Breaking Down “Water at a Wedding”
26:50
26:50
Afspil senere
Afspil senere
Lister
Like
Liked
26:50Greylan James joins Like A Farmer for an entertaining episode built on gratitude. He opens up about the true story behind “Water at a Wedding”, the emotional inspiration behind “Give Me a Second,” and what it’s really like writing songs for Kenny Chesney, Jordan Davis, Cole Swindell, Chris Young, and more. Greylan shares how Kenny Chesney changed h…
…
continue reading
1
From Major League Baseball to Land Acquisition with Connor Johnstone
54:13
54:13
Afspil senere
Afspil senere
Lister
Like
Liked
54:13Tune in to Lennar’s Connor Johnstone on Atlanta land acquisition, data-driven underwriting, trends, and tech tools speeding deals for developers. The Crexi Podcast connects CRE professionals with industry insights built for smart decision-making. In each episode, we explore the latest trends, innovations and opportunities shaping commercial real es…
…
continue reading
1
The Whyte Python World Tour with Travis Kennedy
18:46
18:46
Afspil senere
Afspil senere
Lister
Like
Liked
18:46In the late 1980s, a band exploded out of LA's Sunset Strip, and their power cords spread far and wide, playing a vital role in defeating communism. That is the tale of the fictional Whyte Python and Alex and Boney loved every single moment. Author Travis Kennedy takes on the 15 minutes to wade through your hosts basically fangirling every single s…
…
continue reading
1
I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend
10:25
10:25
Afspil senere
Afspil senere
Lister
Like
Liked
10:25This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend. A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. Check more stories related to cybersecu…
…
continue reading
1
Securing Kafka for PCI DSS Compliance: A Practical Guide for Financial Data Pipelines
10:31
10:31
Afspil senere
Afspil senere
Lister
Like
Liked
10:31This story was originally published on HackerNoon at: https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines. comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit Check more stories related…
…
continue reading
1
947: How to Get Hired at Top Firms like Netflix and Spotify, with Jeff Li
1:09:32
1:09:32
Afspil senere
Afspil senere
Lister
Like
Liked
1:09:32Jeff Li tells Jon Krohn what it's like to work at scale as a data scientist and a machine learning engineer at Netflix, Spotify and DoorDash, as well as how to get a foot in the door at these companies. Jeff also discusses how to run forecasts and trends, and how to read their results. Listen to hear Jeff Li discuss how Spotify became a podcast pow…
…
continue reading
1
How Quantum Computers Threaten Bitcoin and the Entire Internet: Simply Explained
17:43
17:43
Afspil senere
Afspil senere
Lister
Like
Liked
17:43This story was originally published on HackerNoon at: https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained. Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). Check more stories related to cyb…
…
continue reading
1
The Kit-Bag (Learn English with a Short Story) [965]
1:51:13
1:51:13
Afspil senere
Afspil senere
Lister
Like
Liked
1:51:13[965] It is traditional to tell a scary story at Christmas time, so here is one for this year's festive season. The Kit-Bag by Algernon Blackwood is a classic scary tale which will give you a chill, while you stay cosy and warm indoors this winter. Listen and I will explain a lot of vocabulary which comes up in the story. Get the episode PDF with s…
…
continue reading
1
#208: Emma Saroyan shares her practical guide to generative AI for web developers
44:49
44:49
Afspil senere
Afspil senere
Lister
Like
Liked
44:49Curious how to build real web apps with AI without turning into a prompt robot? We sit down with developer advocate and author Emma Saroyan to unpack a practical path for using OpenAI APIs and Next.js to turn ideas into shipped projects you actually understand. From smart prompting to project structure, Emma shows how to work with AI as an assistan…
…
continue reading
1
$14.6 Million in RWA Hacks This Year Reveals the Gap Between Tokenization Hype and Reality
10:18
10:18
Afspil senere
Afspil senere
Lister
Like
Liked
10:18This story was originally published on HackerNoon at: https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality. RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? Check more stories relat…
…
continue reading
1
The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Modern Tech
10:46
10:46
Afspil senere
Afspil senere
Lister
Like
Liked
10:46This story was originally published on HackerNoon at: https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech. We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. Check more stories related …
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-request-response-really-works. Learn how the request–response model really works under the hood. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #network, #request-response-model, #reque…
…
continue reading
1
Taking Control Of Software Supply Chains in the Open Source Era
7:02
7:02
Afspil senere
Afspil senere
Lister
Like
Liked
7:02This story was originally published on HackerNoon at: https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era. Understanding how these recent npm attacks unfolded will help signal a way forward for a more secure software supply chain. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
…
continue reading
1
Ep61: William Lyon on Knowledge Graphs + Agentic Memory
15:05
15:05
Afspil senere
Afspil senere
Lister
Like
Liked
15:05For the first time ever, Jennifer welcomes a guest to the show! William Lyon gives us a deep dive into the evolving world of AI agents, knowledge graphs, and the concept of memory in artificial intelligence. Episode highlights: William’s career journey: from Neo4j to startups and back again The role of knowledge graphs in agentic memory and reasoni…
…
continue reading
1
946: How Robotaxis Are Transforming Cities
8:03
8:03
Afspil senere
Afspil senere
Lister
Like
Liked
8:03Jon Krohn looks into the benefits of robotaxis, from safety to affordability, in this Five-Minute Friday. Hear about Waymo’s partnership with Jaguar Land Rover, the latest safety studies concerning driverless vehicles, and a case for robotaxis becoming the preferred method of transport in the US, where households spend roughly 15% of their budget o…
…
continue reading
1
You’ve Learned to Break Wi-Fi. Now Learn to Lock It Down.
32:31
32:31
Afspil senere
Afspil senere
Lister
Like
Liked
32:31This story was originally published on HackerNoon at: https://hackernoon.com/youve-learned-to-break-wi-fi-now-learn-to-lock-it-down. A practical guide to Wi-Fi hardening using strong passwords, entropy, OpSec and key router safeguards for a safer, more resilient network. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyber…
…
continue reading
1
070: Rebels And Outliers: Real Stories Of The American West by John M. Glionna
50:15
50:15
Afspil senere
Afspil senere
Lister
Like
Liked
50:15John M. Glionna discusses and reads from Rebels And Outliers: Real Stories Of The American West (University Of Nevada Press, 2025), a collection of pieces written while a roving reporter for the LA Times and others, detailing often overlooked corners of the West and the unique, resilient people who occupy them. https://www.johnglionna.com/ john.gli…
…
continue reading
1
AI-Generated Music: Tech, Copyright & Real-World Applications with Mateusz Modrzejewski
31:47
31:47
Afspil senere
Afspil senere
Lister
Like
Liked
31:47In this episode, I talk with Mateusz Modrzejewski, a professional musician and AI researcher and assistant professor at the Warsaw University of Technology, about AI-generated music: how it works, what artists think about it, the big copyright questions, and where AI tools can genuinely support the creative process instead of replacing it. Outline …
…
continue reading
1
AI Cybersecurity: The Sword and Shield of the Next Cyber Frontier
9:12
9:12
Afspil senere
Afspil senere
Lister
Like
Liked
9:12This story was originally published on HackerNoon at: https://hackernoon.com/ai-cybersecurity-the-sword-and-shield-of-the-next-cyber-frontier. Offense is simple; defense demands perfection. How nation-states are using AI to poison data, hack trust, and bypass the "Zero Trust" perimeter. Check more stories related to cybersecurity at: https://hacker…
…
continue reading
1
How Will We Distinguish Truth From Fiction?
7:16
7:16
Afspil senere
Afspil senere
Lister
Like
Liked
7:16This story was originally published on HackerNoon at: https://hackernoon.com/how-will-we-distinguish-truth-from-fiction. Deepfakes powered by AI are redefining trust online. Can technology and human oversight still separate fact from fiction? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check …
…
continue reading
1
Decoding Property Valuation: Insights from Appraisal and Law Expert Josh Wood
1:05:20
1:05:20
Afspil senere
Afspil senere
Lister
Like
Liked
1:05:20Valbridge’s Josh Wood joins The Crexi Podcast to explore evidence based property valuation, fee simple disputes, expert testimony, and how AI will reshape appraisal work. The Crexi Podcast connects CRE professionals with industry insights built for smart decision-making. In each episode, we explore the latest trends, innovations and opportunities s…
…
continue reading
Send us a text In this special on-location episode of The Art of Network Engineering, Andy Lapteff sits down in person with Kevin Myers for a conversation that pulls no punches. Kevin brings decades of service provider and whitebox experience to the table as the two dive deep into one of networking’s most complex decisions: how to choose the right …
…
continue reading
1
Python, Ostrich & Stingray Boots?! Tecovas Designer Spills the Secrets
26:38
26:38
Afspil senere
Afspil senere
Lister
Like
Liked
26:38This week on the Like A Farmer Podcast, Pat sits down with Tecovas design team member Collin Clough for a rare, behind-the-scenes look at how the fastest-growing brand in western wear brings its iconic boots to life. Collin breaks down how Tecovas stays rooted in true Western DNA, the creative process inside their footwear design studio, and what g…
…
continue reading
1
The Hitler Years - Holocaust 1933-45 with Frank McDonough
18:56
18:56
Afspil senere
Afspil senere
Lister
Like
Liked
18:56In this fourth volume of his study of Germany under Hitler, Frank McDonough turns his attention to the holocaust, and we ask him what he found, all in 15 minutes... But as you are our fab Patreon supporters, you get Extra Time with Frank! Patreon members get extra time: 15 more minutes in which you get to see behind the scenes and find out how the …
…
continue reading
1
Trailer – AI-Generated Music: Tech, Copyright & Real-World Applications with Mateusz Modrzejewski
1:26
1:26
Afspil senere
Afspil senere
Lister
Like
Liked
1:26AI-generated music is on the rise, but what does that mean from a technical and creative perspective? In this upcoming episode, I talk with Mateusz Modrzejewski, a professional musician and AI researcher, about AI-generated music: how it works, what artists think about it, the big copyright questions, and where AI tools can genuinely support the cr…
…
continue reading
1
A Developer’s Guide to Choosing the Right DAST Tool in 2026
13:00
13:00
Afspil senere
Afspil senere
Lister
Like
Liked
13:00This story was originally published on HackerNoon at: https://hackernoon.com/a-developers-guide-to-choosing-the-right-dast-tool-in-2026. A practical guide for developers to choose the right DAST tool in 2026. Compare top tools, key features, and what really matters for secure applications. Check more stories related to cybersecurity at: https://hac…
…
continue reading
1
Adversarial Attacks on Large Language Models and Defense Mechanisms
9:24
9:24
Afspil senere
Afspil senere
Lister
Like
Liked
9:24This story was originally published on HackerNoon at: https://hackernoon.com/adversarial-attacks-on-large-language-models-and-defense-mechanisms. Comprehensive guide to LLM security threats and defenses. Learn how attackers exploit AI models and practical strategies to protect against adversarial attacks. Check more stories related to cybersecurity…
…
continue reading
1
945: AI is a Joke, with Joel Beasley
56:11
56:11
Afspil senere
Afspil senere
Lister
Like
Liked
56:11Is there humor in data? Joel Beasley, host of Modern CTO, tells Jon Krohn how he used AI to turn his sights to stand-up comedy. He also shares his tips on tech leadership that he learned from his popular podcast, Modern CTO, and how he is using generative AI as a collaborative partner in his creative work. This episode is brought to you by the De…
…
continue reading
1
#207: Spicy brains & real code - Simen Daehlin talks coding with neurodiversity
48:32
48:32
Afspil senere
Afspil senere
Lister
Like
Liked
48:32In this episode, we talk with Simen, a senior software engineer and creator of Almost Done, a weekly email newsletter designed for neurodivergent developers and anyone who thinks a little differently. Simen shares how he built a format that supports real attention - short, scannable essays, intentional accessibility choices, and four writing “perso…
…
continue reading
1
Cybersecurity’s Global Defenders Converge in Riyadh for Black Hat MEA 2025
6:19
6:19
Afspil senere
Afspil senere
Lister
Like
Liked
6:19This story was originally published on HackerNoon at: https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025. Black Hat MEA 2025 will bring together over 45k attendees, 450 exhibitors, & 300 globalspeakers from December 2–4 at Riyadh Exhibition and Convention Center Check more stories related to cybersecuri…
…
continue reading
1
A Cosy Rambling Episode at Home [964]
1:10:27
1:10:27
Afspil senere
Afspil senere
Lister
Like
Liked
1:10:27In this audio-only episode today you can join me at home as I potter around, and take time to relax while recording a rambling episode for you to enjoy. Enjoy the sounds of street noise outside, and my attempts to find the most comfortable spot in my flat where I can ramble about various things, including several robberies in Paris - one of which i…
…
continue reading
Just six months after the end of the Great War, seven young men would arrive in Newfoundland with their teams to fly the Atlantic. Author David Rooney has researched them all and has just 15 minutes to convince you to buy his book! Join us on Patreon for an extra 15 minutes: https://www.patreon.com/15MinuteBookClub Patreon members get extra time: 1…
…
continue reading
1
One Identity Safeguard Named a Visionary In The 2025 Gartner Magic Quadrant For PAM
5:45
5:45
Afspil senere
Afspil senere
Lister
Like
Liked
5:45This story was originally published on HackerNoon at: https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam. Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasi Check more stories related …
…
continue reading
1
Quttera Launches "Evidence-as-Code" API to Automate Security Compliance For SOC 2 and PCI DSS v4.0
5:51
5:51
Afspil senere
Afspil senere
Lister
Like
Liked
5:51This story was originally published on HackerNoon at: https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. Check more stories related to cybersecurity at: ht…
…
continue reading
1
944: Gemini 3 Pro: Google’s Back on Top
8:21
8:21
Afspil senere
Afspil senere
Lister
Like
Liked
8:21Google is steaming ahead with launching its top-league new Gemini 3 Pro model across their product suite, from Google Search to Vertex AI cloud services. The multinational tech company is also letting eager early adopters like Wayfair and GitHub. Get all the detailed data, its performance across hard-to-game industry benchmarks, and what this all m…
…
continue reading
1
When "Just Following Guidelines" Isn't Enough
12:10
12:10
Afspil senere
Afspil senere
Lister
Like
Liked
12:10This story was originally published on HackerNoon at: https://hackernoon.com/when-just-following-guidelines-isnt-enough. A Reddit post highlights the failure modes of internal AI agents. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #ai-security, #machine-learning,…
…
continue reading
1
When APIs Talk Too Much – A Lesson About Hidden Paths
3:46
3:46
Afspil senere
Afspil senere
Lister
Like
Liked
3:46This story was originally published on HackerNoon at: https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths. Why API security requires more than just endpoint protection and what developers can take away. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
…
continue reading
1
Educational Byte: How Fake CAPTCHAs Can Steal Your Crypto
5:01
5:01
Afspil senere
Afspil senere
Lister
Like
Liked
5:01This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto. Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading
1
Zero Trust Security Goes Mainstream as Breach Costs Hit Record Highs
10:48
10:48
Afspil senere
Afspil senere
Lister
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs. Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today. Check more stories related to cybersecurity at: https:…
…
continue reading
1
AI in the Real World - Marlene Mhangami & Tim Allen
1:11:40
1:11:40
Afspil senere
Afspil senere
Lister
Like
Liked
1:11:40Marlene’s personal website and Tim’s Keynote: Django Reimagined For The Age of AI by Marlene at DjangoCon US and GitHub repo What a Decade! by Tim at DjangoCon US Django Girls Offline Sponsor This episode was brought to you by HackSoft, your development partner beyond code. From custom software development to consulting, team augmentation, or openi…
…
continue reading
1
069: The Whyte Python World Tour by Travis Kennedy
31:24
31:24
Afspil senere
Afspil senere
Lister
Like
Liked
31:24Travis Kennedy discusses and reads from his debut novel, The Whyte Python World Tour (Doubleday, 2025), wherein the CIA exploits a glam metal band as part of a psy-op to destabilize communist countries during the cold war. https://traviskennedy.com/ [email protected] Bluesky:@abookanditsauthor.bsky.social Instagram: a_book_and_its_author …
…
continue reading
1
Introducing the 15 Minute Book Club!
20:26
20:26
Afspil senere
Afspil senere
Lister
Like
Liked
20:26History Hack regulars Alex Churchill and Matt Bone are back! We don't always have an hour or so to spare. In this new, short-form podcast, Alex and Matt interview an author, gameshow style, and they have fifteen minutes on the clock to convince you to buy their new book. With a minute to go, the alarm sounds and your hosts will throw out the meanes…
…
continue reading
1
Episode 152: High School CS with Quincy Tennyson
54:19
54:19
Afspil senere
Afspil senere
Lister
Like
Liked
54:19In this episode, we sit down with Quincy Tennyson, who teaches an impressive four-year computer science pathway at Fern Creek High School. Quincy's background in the Marine Corps and as a network engineer brings a unique perspective to CS education. He discusses his curriculum progression from introductory courses through AP Computer Science Princi…
…
continue reading