show episodes
 
Artwork

1
Ansible Radio

Ansible Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ansible Radio is an up and coming science fiction / craft beer podcast where the hosts, Blake and Logan discuss craft brews and all things speculative. While science fiction is the main topic of discussion, anything and everything is on the table.
  continue reading
 
Artwork

1
Heavy Networking

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
  continue reading
 
Welcome to FLOPS & Threads, a podcast focused on computing, software, Linux, and open source. Join us as we unravel the intricacies of enterprise software infrastructure—from Enterprise Linux to HPC, cloud, automation, and containers. Learn from the experts with entertaining and fun topics and speakers from CIQ, open-source community members, and other organizations.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
Terminal Talk

Jeff Bisti

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In this podcast, we‘ll take a look at the people, technology, and culture behind one of the world‘s most powerful and important computing platforms, the Mainframe. Expect interviews, discussions, and interesting tidbits along the way, with your hosts, Frank and Jeff.
  continue reading
 
Join Peg Tuttle as she sits down with IBM i users and professionals to chat about your favorite IT system. Hear from innovators, thought leaders, and everyday users about how they run the i in their shops and what this powerful platform has allowed them to accomplish in their business.
  continue reading
 
Loading …
show series
 
Serves as an in-depth resource for mastering Ansible, a powerful automation tool. The book starts by introducing Ansible's fundamentals, including installation across various operating systems like macOS, Linux, and Windows, and the basics of playbooks and modules. It progresses to advanced topics such as deploying complex applications like LAMP an…
  continue reading
 
Focuses on advanced networking within Amazon Web Services (AWS), providing a comprehensive overview of various services and concepts crucial for designing, deploying, and troubleshooting cloud networks. It explores topics such as Virtual Private Clouds (VPCs), including Elastic Network Interfaces (ENIs), prefix lists, and VPC peering for inter-VPC …
  continue reading
 
Explores the profound impact of Artificial Intelligence (AI) on learning, arguing that AI represents a transformative technological revolution comparable to printing or the internet. The author emphasizes that AI is not merely about robots, but rather a complex and multifaceted technology deeply rooted in mathematics and logic, with a history spann…
  continue reading
 
A comprehensive guide to Argo CD, a prominent GitOps tool for Kubernetes, authored by Andrew Block and Christian Hernandez and published by O'Reilly Media. It thoroughly explains Argo CD's architecture, including its microservices, controllers, and stateless design, alongside detailed instructions for installation and configuration. The book emphas…
  continue reading
 
A comprehensive guide to achieving anonymity online. It explores various tools and techniques, including Tor, VirtualBox, Tails, and PGP encryption, to help users protect their privacy from entities like the NSA, FBI, and sophisticated hackers. The text also provides practical advice on handling potential legal issues, using cryptocurrencies like B…
  continue reading
 
Explores the multifaceted landscape of the Internet of Things (IoT), with a particular focus on Radio Frequency Identification (RFID) technology. It details the history, technical specifications, and various types of RFID tags, including passive, active, and semi-passive, and their operating frequencies and communication protocols like EPC Gen-2. T…
  continue reading
 
Explores the concept of the security dilemma within the context of nation-state cyber operations. It examines how states, in their pursuit of self-preservation through cybersecurity measures, can inadvertently escalate tensions and foster mistrust with other nations, mirroring historical military conflicts like the Cold War. The text details variou…
  continue reading
 
Provides a comprehensive guide to Internet of Things (IoT) security, written by Aditya Gupta, CEO of Attify, Inc. The book explores various attack vectors and vulnerabilities prevalent in IoT devices, ranging from hardware and firmware exploitation to radio communication protocols. Readers will learn about practical penetration testing methodologie…
  continue reading
 
A practical guide for hobbyists interested in Radio-Frequency Identification (RFID) technology. Published by Wiley Publishing, Inc. in 2006, the book offers a series of do-it-yourself projects, ranging from RFID-enabled home access systems and car entry solutions to computer login integration and secure safes. It explains various RFID concepts, inc…
  continue reading
 
Explores the intricate world of hardware development, manufacturing, and reverse engineering, particularly focusing on experiences in China. The author shares insights into supply chain complexities, quality control, and the nuances of working with factories, using projects like the Chumby and Novena laptops as examples. A significant portion of th…
  continue reading
 
A comprehensive guide to applied statistics and calculus using Python, focusing on practical implementation rather than just theoretical concepts. It begins with Python fundamentals, covering data structures, functions, and debugging, before moving into statistical topics like descriptive and inferential statistics, probability, and data visualizat…
  continue reading
 
Explores Radio Frequency Identification (RFID) technology, detailing its strategic implementation and potential return on investment (ROI) across various sectors. It examines the fundamentals of RFID, its applications in supply chain management, and the market forces driving and obstructing its adoption, including consumer privacy concerns. The tex…
  continue reading
 
A comprehensive overview of Radio Frequency Identification (RFID) technology, detailing its fundamental components, such as transponders, transceivers, and application systems, and exploring its various operating frequencies and powering techniques. It extensively discusses RFID applications, ranging from supply chain management and animal identifi…
  continue reading
 
A detailed guide to foundational computer concepts, aimed at programmers seeking a deeper understanding. The book covers a vast array of topics, beginning with the fundamental components of computer hardware like bits, Boolean operations, and integrated circuits, and progressing to how software interacts with this hardware, including programming la…
  continue reading
 
Perhaps the biggest question around adopting network automation is whether you should build a solution using open source tools and a lot of coding glue, or buy a network automation platform from a vendor and construct your automation solution on top of that. Either way has tradeoffs. Network engineer Lee Harper joins Heavy Networking to... Read mor…
  continue reading
 
Explores various facets of Radio-Frequency Identification (RFID) technology, beginning with its fundamental principles and components, such as tags (also called transponders), readers, and backend systems. A significant portion addresses the security and privacy implications of ubiquitous computing and RFID systems, defining concepts like confident…
  continue reading
 
Offers a comprehensive guide to Kotlin programming, covering its syntax, features, and best practices. It establishes Kotlin's relationship with Java and Scala, highlighting its improvements in conciseness and functional programming capabilities, while also acknowledging similarities to Scala. The source details fundamental data types, class and ob…
  continue reading
 
A comprehensive guide for modern web development, particularly focusing on the role of a full stack developer. It explores various facets of building web applications, from planning work using agile methodologies like Scrum and Kanban, to designing user experiences (UX) and understanding information architecture. The text also covers essential tech…
  continue reading
 
A comprehensive overview of RFID (Radio Frequency Identification) and Wireless Sensor Networks (WSNs), individually and as integrated systems. It explores fundamental concepts of both technologies, including architectures, communication protocols like EPC Gen-2 and IEEE 802.15.4/ZigBee, and the critical challenge of collision avoidance in tag and r…
  continue reading
 
A Book designed to introduce teenagers to Python programming. The text covers fundamental programming concepts such as data types (integers, floats, strings, tuples, dictionaries), variables, operators, and control flow (loops and conditional statements). It also explains object-oriented programming (OOP) principles, including classes, objects, and…
  continue reading
 
A guide for those evaluating radio frequency identification (RFID) for object tracking, offering insights for both business managers and researchers. It compiles pioneering academic research from leading institutions like the Auto-ID Labs at MIT and the University of Cambridge, addressing the engineering challenges and best practices for RFID deplo…
  continue reading
 
Offer a comprehensive overview of Radio Frequency Identification (RFID) systems, exploring their various facets from fundamental components to advanced applications. They discuss RFID tag and reader design, including circuitry, memory, and power management techniques like energy harvesting. The sources also examine communication protocols and anti-…
  continue reading
 
Offer a diverse range of self-help and instructional guides, primarily focusing on diet and health alongside several programming and computer-related topics. The diet sections introduce various plans such as green smoothie cleanses, whole food diets, ketogenic diets, DASH diets, and vegan eating, often including recipes and lifestyle tips for weigh…
  continue reading
 
Offers an in-depth exploration of Radio Frequency Identification (RFID) technology, specifically focusing on Ultra High Frequency (UHF) and Super High Frequency (SHF) applications. It covers fundamental concepts such as the history, uses, and operating principles of RFID systems, including energy transfer, communication modes, and the elements of b…
  continue reading
 
Aims to equip readers with the knowledge to build and customize Python web applications without relying on a predefined framework. It covers a broad spectrum of topics essential for web development, including choosing appropriate tools like web servers (CherryPy), server-side scripting languages (Python), and database engines (SQLite). The guide em…
  continue reading
 
Provides a comprehensive introduction to Radio Frequency Identification (RFID) technology within the context of logistics and supply chain management. It covers the fundamental components of RFID systems, including different types of tags (passive, active, read-only, read/write) and readers, along with their operational characteristics and applicat…
  continue reading
 
Introduces both Python and C++ programming languages, guiding newcomers through the fundamentals of hardware and software interaction. It offers practical tutorials on setting up development environments across Windows, macOS, and Linux, and explores core concepts such as variables, data types, loops, decision-making, and functions. The book also c…
  continue reading
 
Provides a comprehensive guide to programming, primarily focusing on C++ and Python. It offers beginner-friendly instructions on setting up development environments for C++ across various operating systems like Windows, Mac, and Linux. The material then transitions into fundamental C++ concepts, including variables, data types, strings, and mathema…
  continue reading
 
Provides an extensive overview of the dark web, exploring its multifaceted nature through four primary sections: Cyber Crime and Security, Data Mining and Analysis, Online Identity, and Web Crawling. It features contributions from a diverse group of international researchers, examining topics ranging from the diffusion of cybercrime and deep web in…
  continue reading
 
On Heavy Networking today, AI operations for networking. That is, how do we delegate some amount of responsibility for network operations to artificial intelligence? Cisco is our sponsor, and our guests are Omar Sultan, Director for Product Management of Automation and AI; and Javier Antich, Chief Mad Scientist for AI (yes, that’s his title!). We t…
  continue reading
 
Presents a critical examination of Radio Frequency Identification (RFID) technology. Published in 2005, the book argues that corporations and governments are planning to use RFID tags to monitor and control individuals' lives, from tracking purchases and movements in stores to potentially implanting chips in humans for identification and even physi…
  continue reading
 
A comprehensive guide to social engineering. It defines social engineering as exploiting human psychology to gain unauthorized access, contrasting it with technical hacking. The document details various social engineering tactics like pretexting, phishing, quid pro quo, baiting, and tailgating, providing real-world examples. It also categorizes dif…
  continue reading
 
Focusing on security and privacy within wireless and mobile networks, initially published in the journal Future Internet from 2017-2018. It covers diverse topics such as protecting RFID tag privacy through ECC-based protocols, detecting Sybil attacks in mobile Wireless Sensor Networks using watchdog algorithms, and adaptive privacy protection metho…
  continue reading
 
Addresses various security issues and privacy concerns within the context of Industry 4.0 applications. Topics explored include the use of Internet of Things (IoT) in smart water management systems, emphasizing their architecture and a literature review on related research. Additionally, the texts discuss network forensics and cloud security challe…
  continue reading
 
Focuses on security considerations within RFID (Radio-Frequency Identification) and sensor networks, divided into two main parts: security in RFID and security in wireless sensor networks. The book covers a range of topics including multi-tag RFID systems, threats, various attack methods like relay and replay attacks, physical privacy and security,…
  continue reading
 
Explores the intricate world of RFID (Radio Frequency Identification) technology and its integration with sensors. It begins by detailing various automatic identification systems, including barcodes, magnetic stripe cards, and smart cards, before focusing on RFID's history, fundamental principles, and operational mechanisms. The source delves into …
  continue reading
 
Serves as a practical guide to ethical hacking and penetration testing. It systematically introduces fundamental concepts of hacking, details the setup of a virtual lab environment using tools like VirtualBox and Kali Linux, and explains Linux basics crucial for such operations. The book progresses to advanced attack methodologies, including Man-in…
  continue reading
 
Explores HTML5, CSS, and JavaScript features through the creation of interactive web applications and games. It covers fundamental concepts like document structure, styling, and scripting, progressing to more complex topics such as animation, user input handling (mouse and keyboard events), and local data storage. The text systematically explains h…
  continue reading
 
Detailing its use in the digital world and offering practical applications. Readers can explore fundamental concepts like common coding mistakes and variables, learn to implement functions and manage files, and gain insights into creating graphics and using modules. Additionally, the guide introduces C++ fundamentals, covering topics such as settin…
  continue reading
 
Provides a comprehensive guide to understanding and implementing web applications using the Vue.js 2.0 framework. It explores core Vue.js concepts such as reactive data binding, reusable components, and the Vuex state management system. The text also covers practical aspects like testing (unit and end-to-end), deploying applications to platforms li…
  continue reading
 
Serves as a comprehensive guide to web design and development. The excerpts explain fundamental concepts of HTML, covering elements, attributes, and document structure, and then transition into CSS, detailing styling properties, selectors, and layout techniques like Flexbox and Grid. Furthermore, the content touches upon JavaScript fundamentals for…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play