Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Technical interviews about software topics.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
The State and Popular Culture
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A podcast about web design and development.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
Audio podcasts on software testing.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
A place for elite leaders and teams.
…
continue reading
next generation web podcast
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading

1
The era of durable execution (Interview)
1:40:03
1:40:03
Play later
Play later
Lists
Like
Liked
1:40:03Stephan Ewen, Founder and CEO of Restate.dev joins the show to talk about the coming era of resilient apps, the meaning of and what it takes to achieve idempotency, this world of stateful durable execution functions, and when it makes sense to reach for this tech. Join the discussion Changelog++ members save 10 minutes on this episode because they …
…
continue reading

1
Turing Award Special: A Conversation with David Patterson
55:46
55:46
Play later
Play later
Lists
Like
Liked
55:46David A. Patterson is a pioneering computer scientist known for his contributions to computer architecture, particularly as a co-developer of Reduced Instruction Set Computing, or RISC, which revolutionized processor design. He has co-authored multiple books, including the highly influential Computer Architecture: A Quantitative Approach. David is …
…
continue reading

1
SE Radio 663: Tyler Flint on Managing External APIs
52:27
52:27
Play later
Play later
Lists
Like
Liked
52:27Tyler Flint, CEO of qpoint.io, joins host Robert Blumen for a conversation about managing external vendor dependencies, including several best practices for adoption. They start with a look at internal versus external services, including details such as the footprint of external services within a micro-services application, and difficulties organiz…
…
continue reading

1
#167 From drop-out to software architect with Jason Lengstorf
1:20:55
1:20:55
Play later
Play later
Lists
Like
Liked
1:20:55On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Jason Lengstorf. He learned to code out of necessity building websites for local emo bands. He dropped out of college but eventually worked as an engineer at IBM and has gone on to roles at many other companies doing everything from software architecture to managem…
…
continue reading

1
Cyber Security Alerts: Recent Breaches and EDR Software Vulnerabilities
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several…
…
continue reading

1
Practicing Software Testing – Guest James Lyndsay
52:17
52:17
Play later
Play later
Lists
Like
Liked
52:17Show notes: Practicing Software Testing – Guest James LyndsayBy Testing Podcast
…
continue reading
Jim’s server is getting hammered by AI scrapers and he’s big mad about it, why RCS doesn’t work on Android without Google apps, a complex Google account issue, and how Jim and Allan handle their WireGuard configs. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Network Offload and Socket Splicing (SO_SPLICE) in…
…
continue reading

1
AI Data Infrastructure for the Global South with Kate Kallott
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45By Scott Hanselman
…
continue reading

1
Former cybersecurity officials lose clearances.
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large Language Models (LLMs) in automating Cyber Threat Intelligence. Hackers…
…
continue reading

1
Episode 218: The Principles of AI Assisted Coding
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01Brent Jensen and Alan Page Show notes: Episode 218: The Principles of AI Assisted CodingBy Testing Podcast
…
continue reading
Charlton's Socials Packfiles.io Charlton on LinkedIn Coder's Socials Mike on X Mike on BlueSky Mike's Blog Coder on X Coder on BlueSky Show Discord Alice TMB Earth Day 2025 CompetitionBy The Mad Botter
…
continue reading
We chat with Steve Manuel (of dylibso.com and mcp.run) about LLM "plugins" with Wasm & MCP (Model Context Protocol). Discuss this episode: discord.gg/XVKD2uPKyF
…
continue reading

1
OCC major incident, Oracle confirms hack, Smokeloader servers seized
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23U.S. Comptroller suffers ‘major incident’ Oracle confirms "obsolete servers" hacked Police seize Smokeloader malware servers and detain customers Thanks to our episode sponsor, Nudge Security Nudge Security is the only solution for SaaS security and governance that can discover up to two years of historical SaaS spend along with usage insights so y…
…
continue reading

1
CRITICAL LESSONS I Learned from AUSSIE MILLIONAIRES | Day 10
14:06
14:06
Play later
Play later
Lists
Like
Liked
14:06Find your Spy Superpower: https://yt.everydayspy.com/4lr1RvK Aussie entrepreneurs aren’t that different from American entrepreneurs, only they have to work with a weaker currency and a softer workforce. That makes their business leaders and success stories all the more impressive! Here was my experience with Aussie market movers and business owners…
…
continue reading
Chad talks with Karen King, Found of Gold Star Pro, and her drive to help small business owners reach their full potential. Karen talks about the all-inclusive space Gold Star Pro offers for solopreneurs, the automation behind it all, as well as balancing a life of world travel with running a successful business. — Want to take a step up in your sm…
…
continue reading

1
You get a million dollars, and you get a million dollars!
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to tra…
…
continue reading

1
“There is a real cost to moving fast”: Using AI to accelerate drug discovery
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23They also: Explore key challenges engineering leaders face, including data capacity, relevance, and throttling issues. Highlight how emerging AI tools and applications are transforming software engineering practices. Episode notes: Connect with Maureen Makes on LinkedIn. Learn more about Recursion and their open roles here. Read about Knowledge Sol…
…
continue reading

1
Agentic AI in .NET with Spencer Schneidenbach
56:00
56:00
Play later
Play later
Lists
Like
Liked
56:00Ready to build an agentic AI in .NET? Carl and Richard talk to Spencer Schneidenbach about his work using large language models to enhance customer interactions in healthcare. Spencer discusses using the LLMs to summarize customer conversations to identify topic areas, sentiment, and other concerns. He digs into how Microsoft's Semantic Kernel make…
…
continue reading

1
SANS Stormcast ThursdayApril 10th: Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide;
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
…
continue reading
Treasury’s OCC reports a major email breach. Patch Tuesday updates. A critical vulnerability in AWS Systems Manager (SSM) Agent allowed attackers to execute arbitrary code with root privileges. Experts urge Congress to keep strict export controls to help slow China’s progress in AI. A critical bug in WhatsApp for Windows allows malicious code execu…
…
continue reading

1
Proactive Observability in Testing with Anam Hira
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42Show notes: Proactive Observability in Testing with Anam HiraBy Testing Podcast
…
continue reading
Wes and Scott talk about the origins of Syntax, sharing how a friendly course name conflict led to a mastermind group, then a podcast, and eventually a full-blown media brand. They also reflect on key milestones, from early episodes and sponsorships to joining Sentry, expanding the team, and what’s next. Show Notes 00:00 Welcome to Syntax! 00:51 Ho…
…
continue reading

1
SANS Stormcast Wednesday, April 10th: Microsoft Patch Tuesday; Adobe Patches; OpenSSL 3.5 with PQC; Fortinet
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
…
continue reading

1
Critical Security Updates and Identity Management Insights
11:13
11:13
Play later
Play later
Lists
Like
Liked
11:13In this episode of Cybersecurity Today, host Jim Love covers important security updates and warnings including critical flaws in WinRAR, a patch for a high severity zero-day vulnerability in Windows CLFS, and a security vulnerability in WhatsApp's Windows desktop application. He urges users to update their software to protect against exploits. Addi…
…
continue reading

1
New WhatsApp vulnerability, Microsoft patches 125 Windows Vulns, Fake Microsoft Office add-in tools push malware
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09WhatsApp vulnerability could facilitate remote code execution Spyware targeting Chinese diaspora Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day Thanks to our episode sponsor, Nudge Security Nudge Security provides advanced security posture management for Okta, Microsoft 365, Google Workspace, and other critical apps. With Nu…
…
continue reading

1
Risky Business #787 -- Trump fires NSA director, CISA cuts inbound
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: Oracle quietly cops to being hacked, but immediately pivots into pretending it didn’t matter NSA and CyberCom leaders fired for not being MAGA enough US Treasury had some dusty corners it hadn’t found China in yet, looked, found China in them …which is a great …
…
continue reading

1
WBIT #6: Be curious, ask questions, and don’t argue with JavaScript
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30When this episode was recorded, Jesse worked for WaveSeven Consulting, which provides business advisory and project delivery support for media and entertainment companies. He now works for ClickUp, same as previous Stack Overflow Podcast guest, RJ Tuit. Read Jesse’s hot takes on his blog. You can connect with Jesse as Jtomchak on all the socials.…
…
continue reading

1
#110 Unlocking Developer Productivity with Justin Reock
1:05:04
1:05:04
Play later
Play later
Lists
Like
Liked
1:05:04Justin Reock has spent a lot of his career thinking about how to help developers be more productive. In this episode we learn about the methodologies that can help developers spend more time in "flow state" - happily coding the fun stuff. Further reading: Measuring developer productivity with the DX Core 4 Discuss this episode: disc…
…
continue reading

1
SN 1020: Multi-Perspective Issuance Corroboration - IoT Done Right, France Phishes, Gmails E2EE
3:08:26
3:08:26
Play later
Play later
Lists
Like
Liked
3:08:26Canon printer driver vulnerabilities enable Windows kernel exploitation. Astonishing cyber-security awareness from a household appliance manufacturer. France tries to hook 2.5 million school children with a Phishing test. Wordpress added an abuse prone feature in 2022. Guess what happened? Oracle? Is there something you'd like to tell us? Utah's go…
…
continue reading
The conversation around AGI and ASI is louder than ever—but the definitions are often abstract, technical, and disconnected from what actually matters. In this episode, I break down a human-centered way of thinking about these terms, why they’re important, and a system that could help us get there. I talk about: • A Better Definition of AGI and ASI…
…
continue reading
Is DOGE using AI to monitor federal employees? Google’s latest Android update addresses two zero-days. Scattered Spider continues its phishing and malware campaigns. Ransomware’s grip is slipping. ToddyCat exploits a critical flaw in ESET products. Oracle privately confirms a legacy system breach. Over 5,000 Ivanti Connect Secure appliances remain …
…
continue reading

1
Does the happy path make us happy? Ep. 84
55:22
55:22
Play later
Play later
Lists
Like
Liked
55:22Show notes: Does the happy path make us happy? Ep. 84By Testing Podcast
…
continue reading
In this episode, our focus is on understanding how attackers achieve lateral movement and persistence through Secure Shell (SSH)—and more importantly, how to spot the forensic traces...
…
continue reading

1
877: The Neural Processing Units Bringing AI to PCs, with Shirish Gupta
1:09:32
1:09:32
Play later
Play later
Lists
Like
Liked
1:09:32NPUs, AIPC, and Dell’s growing suite of AI products: Shirish Gupta speaks to Jon Krohn about neural processing units and what makes them a go-to tool for AI inference workloads, reasons to move your workloads from the cloud and to your local devices, what the mnemonic AIPC stands for and why it will soon be on everyone’s lips, and he offers a speci…
…
continue reading

1
With AI, Don’t Think Like a Hacker, Think Like the Whole of Society
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is our sponsored guest Nathan Hunstad, director, security at Vanta. In this episode: Thinking like AI Building off a solid foundation Start with ownership Follo…
…
continue reading

1
Uber’s On-Call Copilot with Paarth Chothani and Eduards Sidorovics
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
…
continue reading

1
I Visited Australia—And RELEARNED What It Means to Be American | Day 9
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50Find your Spy Superpower: https://yt.everydayspy.com/43Jfikk I recently returned from a trip to Australia where I was reminded how the world views America. I flew through airports without TSA or heavy security, and learned how Aussies see the terrorist attacks from 9/11. For anyone with Australia travel in mind, this entry is for you.…
…
continue reading

1
Apple encryption appeal, Xanthorox AI tool, weaponizing CRM
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Apple appeals UK encryption back door order Researchers warn about AI-driven hacking tool PoisonSeed campaign weaponizes CRM system Thanks to our episode sponsor, Nudge Security Nudge Security discovers every GenAI tool ever used in your org, even those you’ve never heard of. For each tool, you’ll see who introduced it, who else is using it, where …
…
continue reading
Churches are turning to AI to craft sermons and draw in new believers. But when faith interacts with algorithms, does it change what we’re worshipping? Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
OWASP cryptographic failures (noun) [Word Notes]
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.By N2K Networks
…
continue reading

1
Bottom of the first: A veteran VC’s take on the AI landscape
28:00
28:00
Play later
Play later
Lists
Like
Liked
28:00Tomasz is a general partner at Theory Ventures, a venture capital firm focused on early-stage software companies. He’s a coauthor of Winning with Data, a deep dive into how big data has changed business best practices and organizational culture. Tomasz was on the podcast back in 2023. Give it a listen! Explore Tomasz’s writing. Follow Tomasz on Lin…
…
continue reading
If you’re an agile practitioner, coach, or leader, there’s one thing we all fundamentally crave—freedom. But not just freedom in the abstract sense; I’m talking about the freedom to do meaningful work in innovative, impactful ways. Over the past few years, particularly since the upheaval of the pandemic, the landscape of work has radically shifted.…
…
continue reading
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
…
continue reading
Daniel Kokotajlo and the AI Futures Project lays out a potential scenario of superhuman AI’s impact, Liam ERD generates beautiful, interactive ER diagrams from your database, Mozilla takes on Gmail with “Thundermail”, algernon explains why grepping remains terrible & Vitor M. de Sousa Pereira rans on the insanity of being a software engineer. View …
…
continue reading
UK court blocks government's attempt to keep Apple encryption case secret. Port of Seattle says last year's breach affected 90,000 people. Verizon Call Filter App flaw exposes millions' call records. Hackers hit Australian pension funds. A global threat hiding in plain sight. Cybercriminals are yelling CAPTCH-ya! Meta retires U.S. fact-checking pro…
…
continue reading

1
Python Test – pytest-html – a plugin that generates HTML reports for test results
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Show notes: Python Test – pytest-html – a plugin that generates HTML reports for test resultsBy Testing Podcast
…
continue reading

1
Episode 455: UX designer without a mentor and I get bored too easily and stressed too easily
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00In this episode, Dave and Jamison answer these questions: A listener named Dakota asks, I’m a UX designer, and I’m constantly looking for growth opportunities. I’m having trouble finding mentors to help challenge me, as every time my boss/senior designer leaves the company, I assume their work and we don’t backfill their spot or my old position. Th…
…
continue reading
Light mode? Dark mode? Scott and Wes break down the best ways to implement theme switching in CSS, from prefers-color-scheme to manual overrides. Plus, tips on handling shadows, icons, and the dreaded flash of dark mode! Show Notes 00:00 Welcome to Syntax! 01:05 Brought to you by Sentry.io. 02:06 Light and dark mode, things to consider. 02:31 Light…
…
continue reading