Internet Of Things public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
How to Fix the Internet

Electronic Frontier Foundation (EFF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
  continue reading
 
The We talk IoT podcast keeps you up to date with major developments in the world of the internet of things, IIoT, artificial intelligence, and cognitive computing. Our guests are leading industry experts, business professionals, and experienced journalists as they discuss some of today’s hottest tech topics and how they can help boost your bottom line. You can follow We talk IoT – the Internet of Things Business podcast anywhere you get your podcasts. About the host: Stefanie Ruth Heyduck i ...
  continue reading
 
Dive into the cutting-edge world of IoT with "The Innovators of Things," a podcast series that profiles the builders and leaders of connected devices. Hosted by Jillian Kaplan, this series offers listeners an insider's look at the innovations and challenges shaping our connected future. Whether you're a tech enthusiast or an industry professional, "The Innovators of Things" is your source for inspiration and insight into the ever-evolving landscape of IoT. Join us to explore how these vision ...
  continue reading
 
Artwork

1
IoT Leaders

Nick Earle, Executive Chairman, Eseye

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
The IoT For All Podcast is focused on bringing together the smartest and most creative minds in the Internet of Things (IoT) industry to share their knowledge and experiences with the world. The ultimate goal is to help others succeed and educate the world on the benefits and inner workings of the Internet of Things industry.
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
  continue reading
 
Artwork
 
Delivered is your window into the world of amazing digital products, bold business strategies, and innovation in practice. In a world where 95% of digital products fail, we’re on a mission to find out what sets the 5% apart, bringing you insights from change-makers — business owners, company executives, creatives, tech experts, and other brilliant minds. Brought to you by Infinum, a leading digital product agency, and hosted by Chris Bradshaw, Infinum’s product strategy director.
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
  continue reading
 
Artwork

1
The Next Right Thing

with Emily P. Freeman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
For the second-guessers, the chronically hesitant, or anyone who suffers from decision fatigue, best-selling author and host Emily P. Freeman helps create a little space for your soul to breathe so you can discern your next right thing in love. Because out of the thousands of decisions you make everyday, chances are a few of them threaten to keep you up at night. If you're in a season of transition, waiting, general fogginess or if you've ever searched "how to make a decision" on the interne ...
  continue reading
 
Artwork

1
Internet Technology

Ronald Legarski

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
SolveForce Information Technology is a leading provider of IT solutions and services, offering comprehensive managed services to businesses across the globe. Our team of experienced professionals specializes in providing cost-effective and reliable technology solutions customized to meet your business needs. We understand that every organization has different I.T. infrastructure requirements. Our experts work closely with you to develop an effective strategy tailored to your company's goals ...
  continue reading
 
Conversations with people who are driving technological innovation in business. These are the leading thinkers involved in driving and dealing with technology and other business innovations required for a successful but changing future. Voices include executives at brands, agencies, business leaders across multiple industries, and innovative startups. Subjects discussed include business transformations, The Internet of Things, artificial intelligence, virtual and augmented reality, autonomou ...
  continue reading
 
Artwork

1
The Internet of Things Podcast - Stacey On IoT

Stacey Higginbotham, tech journalist

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Stacey Higginbotham (formerly Sr. Editor at Fortune) and co-host Kevin Tofel discuss the latest news and analysis of the Internet of Things. Covers Consumer IoT, Industrial IoT and Enterprise IoT. Guests include Vint Cerf, Om Malik, and people from Amazon.com, AT&T, IBM Watson and more.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Welcome To The Weekend and "Music Without Boundaries"... A Whole 'Nuther Thing is my weekly Radio Program on KCSN FM 88.5, and Online at http://www.885fm.org/webcast.html each Friday Morning from Midnight to 2AM Pacific. Saturday Afternoons from 3-5 PM Pacific. This website is an archive for my program, contained on this website are past broadcasts comprised of 3 or 4 Hour Episodes. In order to maintain sound quality of these broadcasts I've had to limit the posted archive to approximately 3 ...
  continue reading
 
The Conversations of Things podcast series is hosted by Joe Dugandzic and features interesting guests from inside and outside the technology world, discussing everything from the smart home to general tech to all of the connected gadgets in our lives. Where is all of this technology taking us? Is it helpful or harmful in the long run? And, of course, discussions on recent tech news and the latest must-have devices.
  continue reading
 
Artwork

1
IoT Coffee Talk

Leonard Rob Stephanie David Marc Rick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to IoT Coffee Talk where we talk about all things related to the Internet of Things and other digital technologies. This program was started by a group of friends who just happen to be thought leaders, experienced practitioners and business leaders in the technology and communications services industries and more. This channel will feature weekly recordings of our casual conversations on topics of the day with the hopes of delivering engaging and thought-provoking insights to our aud ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Artwork
 
Future of Things is a podcast by and for those who dream big and want to make a difference. Featuring some of today's most influential changemakers, we discuss how technology is enabling a brighter future. We’ll cover subjects including the internet of things, the circular economy, retail experience, brand protection, the blockchain and much more. Tune in, and let’s build our future together.
  continue reading
 
“OTELCO’s Evolution Digital explores the ways different industries have adapted to ensure continued success in today’s digital marketplace. Hosted by OTELCO Marketing and PR Manager Tracy Scheckel, each episode will feature a new guest from a different industry. Tracy will discuss with her guests how the digital age has changed operations in their organization, and how they see technology further shaping their industry. Education, the pulp and paper industry, advertising and broadcast media, ...
  continue reading
 
Get your gaming on! Jason Howell and Ars Technica's Sam Machkovech bring you 12 episodes and cover it all, from tips and tricks, consoles, gaming rigs, controllers, Virtual Reality, classic gaming, live gameplay, mobile gaming, console hacking, and more! Plus, they'll wrap up with a holiday game guide. Although the show is no longer in production, you can enjoy episodes from the TWiT Archives.
  continue reading
 
Artwork

1
Saving People, Queering Things

Saving People, Queering Things

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A particularly unhinged group of gays watches Supernatural, with a focus on deep story analysis & queering the narrative. 🎙️👻🏳️‍🌈🥧 Season 8 releasing Mondays. Now with Queering People, Saving Throws! Our queer D&D side-adventure featuring KJ (of Supernatural Opinions) releasing Fridays. Find us on the internet: www.queeringthingspodcast.com. 18+ content. We like rousing discussions about things that matter!
  continue reading
 
Artwork
 
Welcome to the Conversations on Applied AI Podcast where Justin Grammens and the team at Emerging Technologies North talk with experts in the fields of Artificial Intelligence and Deep Learning. In each episode, we cut through the hype and dive into how these technologies are being applied to real-world problems today. We hope that you find this episode educational and applicable to your industry and connect with us to learn more about our organization at AppliedAI.MN. Enjoy!
  continue reading
 
Smart Tech Today explains the exciting, dynamic, and sometimes-confusing subject that is the Internet of Things. Mikah Sargent and Matthew Cassinelli guide you through smart switches, lights, thermostats, speakers, and other connected tech. Every week, learn how to make the most of your smart tech. Although the show is no longer in production, you can enjoy episodes from the TWiT Archives.
  continue reading
 
Artwork

1
Force Multiplier

Jonathan Ballon

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Amplify your impact with Jonathan Ballon, a technologist and business leader focused on how advances in technology can create inflexion points that disrupt conventional norms, create economic and societal value and, in the process, reshape the human experience, ultimately for the better. A “Force Multiplier” is intelligence or technology that creates an advantage. In each episode, JB and his special guests dive inside the edge of technology innovation, providing listeners with sharp insights ...
  continue reading
 
Smart Tech Today explains the exciting, dynamic, and sometimes-confusing subject that is the Internet of Things. Mikah Sargent and Matthew Cassinelli guide you through smart switches, lights, thermostats, speakers, and other connected tech. Every week, learn how to make the most of your smart tech. Although the show is no longer in production, you can enjoy episodes from the TWiT Archives.
  continue reading
 
Artwork

1
Berkman Center for Internet and Society: Video Fishbowl

Berkman Center for Internet & Society at Harvard University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Peek inside the Berkman Center's Video Fishbowl: Conversations with leading cyber-scholars, entrepreneurs, activists, and policymakers as they explore the bleeding edge of the internet and technology, democracy, law, and society. (Also available as audio) From the Berkman Center for Internet and Society at Harvard University
  continue reading
 
Artwork
 
Venue52 brings you all the latest on the Christian music scene with a monthly chart rundown of the Top 10 christian songs, a weekly round up of the news, a featured artist for the week and our Random Internet Thing Of The Week.
  continue reading
 
Intellectual property experts Tonya M. Evans (Co-Founder, Legal Write Publications, LLC & Associcate Dean of Academic Affairs and Professor of Law, UNH Franklin Pierce School of Law) and Shontavia J. Johnson (Founder, LVRG LLC & AVP of Academic Partnerships & Innovation, Clemson University) engage in lively and culturally competent conversations and share their so very LIT perspectives about all things law, innovation, and technology. #LITPodcast #LITBraintrust #SoVeryLIT @LITBraintrust
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Loading …
show series
 
Explores the multifaceted landscape of the Internet of Things (IoT), with a particular focus on Radio Frequency Identification (RFID) technology. It details the history, technical specifications, and various types of RFID tags, including passive, active, and semi-passive, and their operating frequencies and communication protocols like EPC Gen-2. T…
  continue reading
 
In this episode of the IoT For All Podcast, Alex Kotler, SVP of Sales and Partnerships at POND IoT, joins Ryan Chacon to discuss multi-network SIMs and why they're a game-changer for IoT. The conversation covers multi-network SIM use cases in ATMs, vending machines, retail, and EV charging, the challenges companies face when transitioning from sing…
  continue reading
 
Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart thermostats and connected doorknobs to pacemakers with IP addresses and hacked fish tanks. You’ll hear real-life stories of IoT gone wrong (including a connected beer brewer used for hacking), explore the c…
  continue reading
 
In this episode, we explore the critical intersection of IoT technology and railway infrastructure with Oliver von Sperber, Managing Director at AXO Track, a German startup transforming railway switch maintenance. Twenty per cent of train delays stem from switch malfunctions, costing operators millions and frustrating passengers worldwide. Oliver a…
  continue reading
 
In this episode of the IoT For All Podcast, Jim Morrish, Founding Partner at Transforma Insights, joins Ryan Chacon to discuss the state of AIoT. The conversation covers the convergence of AI and IoT, how AIoT differs from IoT and M2M, the benefits of deploying AI on IoT devices, market evolution, leading use cases, the hardware and connectivity as…
  continue reading
 
A comprehensive guide to Argo CD, a prominent GitOps tool for Kubernetes, authored by Andrew Block and Christian Hernandez and published by O'Reilly Media. It thoroughly explains Argo CD's architecture, including its microservices, controllers, and stateless design, alongside detailed instructions for installation and configuration. The book emphas…
  continue reading
 
Serves as an in-depth resource for mastering Ansible, a powerful automation tool. The book starts by introducing Ansible's fundamentals, including installation across various operating systems like macOS, Linux, and Windows, and the basics of playbooks and modules. It progresses to advanced topics such as deploying complex applications like LAMP an…
  continue reading
 
If you believe the hype, artificial intelligence will soon take all our jobs, or solve all our problems, or destroy all boundaries between reality and lies, or help us live forever, or take over the world and exterminate humanity. That’s a pretty wide spectrum, and leaves a lot of people very confused about what exactly AI can and can’t do. In this…
  continue reading
 
A comprehensive guide to achieving anonymity online. It explores various tools and techniques, including Tor, VirtualBox, Tails, and PGP encryption, to help users protect their privacy from entities like the NSA, FBI, and sophisticated hackers. The text also provides practical advice on handling potential legal issues, using cryptocurrencies like B…
  continue reading
 
What if you could break down every cyberattack into just 7 steps? In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep into the Cyber Kill Chain — Lockheed Martin’s 7-stage framework for understanding and stopping attacks — and compare it to the MITRE ATT&CK framework, hacker methodology, and even… honeypots, magicians, and Chris…
  continue reading
 
Provides a comprehensive guide to Internet of Things (IoT) security, written by Aditya Gupta, CEO of Attify, Inc. The book explores various attack vectors and vulnerabilities prevalent in IoT devices, ranging from hardware and firmware exploitation to radio communication protocols. Readers will learn about practical penetration testing methodologie…
  continue reading
 
Explores the concept of the security dilemma within the context of nation-state cyber operations. It examines how states, in their pursuit of self-preservation through cybersecurity measures, can inadvertently escalate tensions and foster mistrust with other nations, mirroring historical military conflicts like the Cold War. The text details variou…
  continue reading
 
A practical guide for hobbyists interested in Radio-Frequency Identification (RFID) technology. Published by Wiley Publishing, Inc. in 2006, the book offers a series of do-it-yourself projects, ranging from RFID-enabled home access systems and car entry solutions to computer login integration and secure safes. It explains various RFID concepts, inc…
  continue reading
 
Explores the intricate world of hardware development, manufacturing, and reverse engineering, particularly focusing on experiences in China. The author shares insights into supply chain complexities, quality control, and the nuances of working with factories, using projects like the Chumby and Novena laptops as examples. A significant portion of th…
  continue reading
 
"And I want to rock your gypsy soul Just like way back in the days of old And together we will flow into the mystic" Please join me on this warm Sunday afternoon as we sail into the Mystic musically. Joining us are Billy Cobham, The Youngbloods, Moody Blues, Kinks, Eagles, Steely Dan, Rufus, Boz Scaggs, Yes, Traffic, Spirit, Hall & Oates, Doobie Br…
  continue reading
 
A comprehensive guide to applied statistics and calculus using Python, focusing on practical implementation rather than just theoretical concepts. It begins with Python fundamentals, covering data structures, functions, and debugging, before moving into statistical topics like descriptive and inferential statistics, probability, and data visualizat…
  continue reading
 
Explores Radio Frequency Identification (RFID) technology, detailing its strategic implementation and potential return on investment (ROI) across various sectors. It examines the fundamentals of RFID, its applications in supply chain management, and the market forces driving and obstructing its adoption, including consumer privacy concerns. The tex…
  continue reading
 
This week's program features tuneage from Brewer & Shipley, Janis Joplin, Beatles, Jimi Hendrix Experience, Jefferson Airplane, Talking Heads, Donovan, Kinks, Cat Stevens, Ten Years After, Electric Prunes, Don McLean, Bachman Turner Overdrive, Brian Auger's Oblivion Express, Jeff Beck Group, John McLaughlin, Joni Mitchell, Loggins & Messina, Coldpl…
  continue reading
 
A comprehensive overview of Radio Frequency Identification (RFID) technology, detailing its fundamental components, such as transponders, transceivers, and application systems, and exploring its various operating frequencies and powering techniques. It extensively discusses RFID applications, ranging from supply chain management and animal identifi…
  continue reading
 
A detailed guide to foundational computer concepts, aimed at programmers seeking a deeper understanding. The book covers a vast array of topics, beginning with the fundamental components of computer hardware like bits, Boolean operations, and integrated circuits, and progressing to how software interacts with this hardware, including programming la…
  continue reading
 
Noah and Sam are left alone with the podcast today for an episode where they are definitely going to talk about dogs (they WILL get distracted and talk about cats). They discuss anti-witch bigotry, Sam brings some lore about familiars, and we reach another rant about bad and weird sexualization choices by the Supernatural writers. We also discover …
  continue reading
 
Offers a comprehensive guide to Kotlin programming, covering its syntax, features, and best practices. It establishes Kotlin's relationship with Java and Scala, highlighting its improvements in conciseness and functional programming capabilities, while also acknowledging similarities to Scala. The source details fundamental data types, class and ob…
  continue reading
 
Explores various facets of Radio-Frequency Identification (RFID) technology, beginning with its fundamental principles and components, such as tags (also called transponders), readers, and backend systems. A significant portion addresses the security and privacy implications of ubiquitous computing and RFID systems, defining concepts like confident…
  continue reading
 
A comprehensive overview of RFID (Radio Frequency Identification) and Wireless Sensor Networks (WSNs), individually and as integrated systems. It explores fundamental concepts of both technologies, including architectures, communication protocols like EPC Gen-2 and IEEE 802.15.4/ZigBee, and the critical challenge of collision avoidance in tag and r…
  continue reading
 
A comprehensive guide for modern web development, particularly focusing on the role of a full stack developer. It explores various facets of building web applications, from planning work using agile methodologies like Scrum and Kanban, to designing user experiences (UX) and understanding information architecture. The text also covers essential tech…
  continue reading
 
This episode is all over the place with Regan and Chesko diving into a grab bag of hot topics. They discuss plane etiquette drama, including a man who refused to give up his $300 seat to a rude family and a flight attendant who unapologetically eats tuna mid-flight while judging passengers for eating "fast food poison" and break down a viral video …
  continue reading
 
A Book designed to introduce teenagers to Python programming. The text covers fundamental programming concepts such as data types (integers, floats, strings, tuples, dictionaries), variables, operators, and control flow (loops and conditional statements). It also explains object-oriented programming (OOP) principles, including classes, objects, and…
  continue reading
 
A guide for those evaluating radio frequency identification (RFID) for object tracking, offering insights for both business managers and researchers. It compiles pioneering academic research from leading institutions like the Auto-ID Labs at MIT and the University of Cambridge, addressing the engineering challenges and best practices for RFID deplo…
  continue reading
 
The next wave of IoT connectivity is here. Enter eSIM orchestration. In this episode, Eseye Executive Chairman Nick Earle is joined for a third time by Matt Hatton, Founding Partner and Analyst of Transforma Insights, to explore the market forces driving this shift. The rise of eSIM technology specifications like SGP.32 offers more flexibility, but…
  continue reading
 
This summer, I'm re-airing some of my favorite decision making episodes. This one originally aired on November 15, 2022. Today I'm glad to welcome our favorite Enneagram teacher, author Suzanne Stabile, to talk about the three centers of intelligence and how our stances inform our decisions. Suzanne is a highly sought-after speaker and teacher, kno…
  continue reading
 
Offer a comprehensive overview of Radio Frequency Identification (RFID) systems, exploring their various facets from fundamental components to advanced applications. They discuss RFID tag and reader design, including circuitry, memory, and power management techniques like energy harvesting. The sources also examine communication protocols and anti-…
  continue reading
 
Offer a diverse range of self-help and instructional guides, primarily focusing on diet and health alongside several programming and computer-related topics. The diet sections introduce various plans such as green smoothie cleanses, whole food diets, ketogenic diets, DASH diets, and vegan eating, often including recipes and lifestyle tips for weigh…
  continue reading
 
Quantum computing is no longer science fiction—it’s a ticking clock for modern encryption. In this episode of Legitimate Cybersecurity, Frank and Dustin break down Q-Day, the moment when quantum computers may render current cryptography useless. We explore how close we really are, the science (and hype) behind quantum technology, and what CISOs sho…
  continue reading
 
Offers an in-depth exploration of Radio Frequency Identification (RFID) technology, specifically focusing on Ultra High Frequency (UHF) and Super High Frequency (SHF) applications. It covers fundamental concepts such as the history, uses, and operating principles of RFID systems, including energy transfer, communication modes, and the elements of b…
  continue reading
 
Aims to equip readers with the knowledge to build and customize Python web applications without relying on a predefined framework. It covers a broad spectrum of topics essential for web development, including choosing appropriate tools like web servers (CherryPy), server-side scripting languages (Python), and database engines (SQLite). The guide em…
  continue reading
 
"Living is easy with eyes closed, Misunderstanding all you see It's getting hard to be someone but it all works out It doesn't matter much to me Let me take you down, cause I'm going to Strawberry Fields" Please join me as we travel to places real & imagined on today's 2 hour Musical Journey back to the decade ofthe 1970's. Joining us are Billy Joe…
  continue reading
 
Everybody look - what's going down?" Yes, time for a journey of distraction with 2 hours of "Music Without Boundaries" on this week's Whole 'Nuther Thing. Joining us are Tracy Chapman, The Grateful Dead, Peter Frampton, B.B. King, The Wallflowers, Small Faces, The Move, Traffic, The Romantics, Hollies, Doors, Rolling Stones, Love, The Fortunes, Eas…
  continue reading
 
Provides a comprehensive introduction to Radio Frequency Identification (RFID) technology within the context of logistics and supply chain management. It covers the fundamental components of RFID systems, including different types of tags (passive, active, read-only, read/write) and readers, along with their operational characteristics and applicat…
  continue reading
 
Introduces both Python and C++ programming languages, guiding newcomers through the fundamentals of hardware and software interaction. It offers practical tutorials on setting up development environments across Windows, macOS, and Linux, and explores core concepts such as variables, data types, loops, decision-making, and functions. The book also c…
  continue reading
 
Provides a comprehensive guide to programming, primarily focusing on C++ and Python. It offers beginner-friendly instructions on setting up development environments for C++ across various operating systems like Windows, Mac, and Linux. The material then transitions into fundamental C++ concepts, including variables, data types, strings, and mathema…
  continue reading
 
Provides an extensive overview of the dark web, exploring its multifaceted nature through four primary sections: Cyber Crime and Security, Data Mining and Analysis, Online Identity, and Web Crawling. It features contributions from a diverse group of international researchers, examining topics ranging from the diffusion of cybercrime and deep web in…
  continue reading
 
We unpack how a Swedish entrepreneur used Pablo Escobar’s name to sell fake phones, flamethrowers, and crypto — and how a viral scam built on influencer hype finally came crashing down. That and other stories. Hacked is brought to you by Push Security, check them out at PushSecurity.com Learn more about your ad choices. Visit podcastchoices.com/adc…
  continue reading
 
In this inspiring episode, Jillian Kaplan speaks with Michel Langlois, a trailblazer whose journey began on a chicken farm in rural Quebec and led to shaping some of the world’s most influential telecom companies. Michel shares his insights from building and scaling Cisco during its explosive growth, transforming Juniper from the inside out, and re…
  continue reading
 
A comprehensive guide to social engineering. It defines social engineering as exploiting human psychology to gain unauthorized access, contrasting it with technical hacking. The document details various social engineering tactics like pretexting, phishing, quid pro quo, baiting, and tailgating, providing real-world examples. It also categorizes dif…
  continue reading
 
Presents a critical examination of Radio Frequency Identification (RFID) technology. Published in 2005, the book argues that corporations and governments are planning to use RFID tags to monitor and control individuals' lives, from tracking purchases and movements in stores to potentially implanting chips in humans for identification and even physi…
  continue reading
 
Focusing on security and privacy within wireless and mobile networks, initially published in the journal Future Internet from 2017-2018. It covers diverse topics such as protecting RFID tag privacy through ECC-based protocols, detecting Sybil attacks in mobile Wireless Sensor Networks using watchdog algorithms, and adaptive privacy protection metho…
  continue reading
 
Addresses various security issues and privacy concerns within the context of Industry 4.0 applications. Topics explored include the use of Internet of Things (IoT) in smart water management systems, emphasizing their architecture and a literature review on related research. Additionally, the texts discuss network forensics and cloud security challe…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play