Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
The Cloud Wars franchise, part of the Acceleration Economy Network, analyzes the major cloud vendors from the perspective of business customers. In Cloud Wars Live, Bob Evans talks with both sides about these profoundly transformative technologies, and with monthly All-Star guests from across the business community about the trends impacting how the world lives, works, plays, and dreams. Visit https://accelerationeconomy.com/category/cloud-wars/ for more.
…
continue reading
Each week, Jon Shanks, CEO of cloud-native consultancy and product business Appvia, and tech evangelist Lewis Marshall, senior developer and AI enthusiast, analyse the biggest news stories that week, that are shaping Cloud, Data and AI. Alongside their insight, they invite frontline leaders, Chief Technology Officers and engineering heads from established, cloud-powered organisations to share candid lessons from running real-world workloads at scale. Together, they take the headlines and get ...
…
continue reading
Short educational content about Google Cloud Platform (GCP)
…
continue reading
The Google Cloud Platform Podcast, coming to you every week. Discussing everything on Google Cloud Platform from App Engine to BigQuery.
…
continue reading
Designed & engineered specifically for Dental Practices. Adit is the only dental software that integrates Calls, Texts, Emails, Patient Forms, Online Scheduling, Analytics, Reviews, Payments and more, all in one place! These features are all manageable within Adit's centralized platform, along with detailed insights on all marketing campaigns – Google Ads, social media marketing, or even billboards and flyers. https://www.adit.com
…
continue reading
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
…
continue reading
The Marketing Intelligence Show is all about empowering marketing leaders to work better with data and make sure every marketing dollar counts. On this podcast, you'll learn from Supermetrics' experts on how you can use data to fuel growth and maximize the ROI of your marketing spend. Our goal is to give you the insights and knowledge to turn your raw marketing data into business growth. This podcast is brought to you by Supermetrics, the marketing data intelligence platform used by more tha ...
…
continue reading
Where Technology Meets the Real World
…
continue reading
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
…
continue reading

1
CGX Cast (A Cloud Gaming Podcast) Stadia, Geforce Now, Amazon Luna, xCloud, Shadow PC
Cloud Gaming Xtreme
Welcome to the Cloud Gaming Xtreme Podcast. In this podcast, We Cover every Cloud Gaming Platform. Platforms such as Nvidia Geforce Now, Microsoft Project Xcloud, Shadow, and Google Stadia. We talk about the recent news and discussions in the cloud gaming universe. We have 7 awesome members on the panel who are passionate about cloud gaming. This podcast goes live on youtube every Saturday afternoons at 2 pm PT. You can check out our youtube channel at https://www.youtube.com/CloudGamingXtre ...
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
A podcast about web design and development.
…
continue reading
Netenrich invites security professionals to learn how they can optimize their security operations, remove silos, and gain increased efficiencies with the tools and systems they have. This podcast series is focused on effective detection, investigation, and response techniques where data and analytics is at the foundation. Hear from leading cybersecurity experts on how they’re transforming security ops. Netenrich boosts security and digital operations effectiveness so that organizations can a ...
…
continue reading
Untold Stories is a new podcast started from January 2022, which is cohosted by two hosts Chabi Dhakal from Ontario, Canada and Sagar Dangal from Michigan, USA. The main goal of the Podcast is to create a platform to have a casual and raw conversation with various personalities from different field such as Business, Sports, Community Services, Education, Entertainment, etc. We hope to provide value to our listeners through our guest’s untold stories, experiences, perspectives, and opinions. ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
The RecruitingDaily Podcast is a series of conversations and interviews with thought leaders and practitioners. Each week, the topic digs into the biggest challenges faced in HR, recruiting, and the latest technology innovations you should know about. Listen & Subscribe on your favorite platform Apple | Spotify | Google | Amazon
…
continue reading
Find me on Github/Twitter/Kaggle @SamDeepLearning. Find me on LinkedIn @SamPutnam. This Podcast is supported by Enterprise Deep Learning | Cambridge/Boston | New York City | Hanover, NH | http://www.EnterpriseDeepLearning.com. Contact: [email protected], 802-299-1240, P.O. Box 863, Hanover, NH, USA, 03755. We move deep learning to production. I teach the worldwide Deploying Deep Learning Masterclass at http://www.DeepLearningConf.com in NYC regularly and am a Deep Learning Consultant ser ...
…
continue reading
Interchange is about integrated transport infrastructure as the solution to achieving a more effective and decarbonised transport network. The Interchange podcast is a monthly show, produced in association with Arcadis https://www.arcadis.com/en Hosted by Ayo Abbas, the show will drill down into the challenges, the opportunities and the economic, environmental and societal benefits we could gain by having a low carbon, seamless, and fully integrated transport system that works. Each month we ...
…
continue reading
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
…
continue reading
This week, we cover Apple’s WWDC updates—from containerization to Foundation Models—and the Linux Foundation’s new FAIR Package Manager. Plus, we crown the best SDT Uber rider Watch the YouTube Live Recording of Episode 524 Runner-up Titles Infinite Workday. No more Eudora Revealed productivity. I threw up a tarp over my desk. We agreed to not talk…
…
continue reading

1
Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Two newly disclosed critical vulnerabilities—CVE-2025-5349 and CVE-2025-5777—have put Citrix NetScaler ADC and Gateway deployments at serious risk, exposing enterprise environments to potential data breaches and service disruptions. These flaws underscore the persistent challenges facing infrastructure teams, especially when balancing security patc…
…
continue reading

1
GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21CVE-2025-1568, dubbed "GerriScary", has shaken the open-source ecosystem by exposing a fundamental weakness in Google’s Gerrit code review system—one that could have enabled attackers to infiltrate 18 of Google’s most widely used open-source projects, including Chromium, ChromiumOS, Dart, and Bazel. This episode breaks down how the vulnerability wa…
…
continue reading

1
Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Cisco and Atlassian have both released urgent security advisories in response to newly discovered high-severity vulnerabilities—and the implications are serious. Cisco’s firmware flaws impact Meraki MX and Z Series devices running AnyConnect VPN. A bug in the SSL VPN process allows authenticated attackers to crash the VPN server, causing repeated d…
…
continue reading

1
Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme
50:51
50:51
Play later
Play later
Lists
Like
Liked
50:51A deep dive into one of the most aggressive ransomware groups operating today—Play—and their latest high-profile target: Krispy Kreme. Operating since 2022, the Play ransomware group has become notorious for its double extortion model, where sensitive data is exfiltrated before systems are encrypted. Victims are pressured not just by digital ransom…
…
continue reading

1
Inside Rabbit’s Strategy to Automate Cloud Cost Optimization for Engineering Teams with Balazs Molnar | Cloud Wars Live
19:57
19:57
Play later
Play later
Lists
Like
Liked
19:57Balazs Molnar, CEO and co-founder of Rabbit, chats with Kieron Allen about the evolving challenges of cloud cost management and how engineering teams have become central to tackling them. He explains why traditional FinOps tools fall short, how Rabbit dives below the surface to uncover hidden waste (especially in platforms like BigQuery) and why au…
…
continue reading

1
SE Radio 673: Abhinav Kimothi on Retrieval-Augmented Generation
55:55
55:55
Play later
Play later
Lists
Like
Liked
55:55In this episode of Software Engineering Radio, Abhinav Kimothi sits down with host Priyanka Raghavan to explore retrieval-augmented generation (RAG), drawing insights from Abhinav's book, A Simple Guide to Retrieval-Augmented Generation. The conversation begins with an introduction to key concepts, including large language models (LLMs), context wi…
…
continue reading

1
Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53In this episode, we unpack the dramatic takedown of Archetyp Market, a darknet marketplace that dominated the online drug trade since its launch in May 2020. With over €250 million ($290 million) in drug transactions, more than 600,000 users, and 17,000 listings, Archetyp wasn’t just another darknet forum—it was the largest dedicated drug market on…
…
continue reading

1
KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed
1:07:13
1:07:13
Play later
Play later
Lists
Like
Liked
1:07:13In this episode, we break down one of 2025’s most significant healthcare cybersecurity incidents: the ransomware attack on Ocuco, a global eyecare software provider. On April 1st, 2025, threat actors from the KillSec ransomware group exploited CVE-2024-41197 — a critical authentication bypass in Ocuco’s INVCLIENT.EXE — to gain Administrator-level a…
…
continue reading

1
DragonForce Ransomware: The Evolving Threat to Healthcare Data
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In this episode, we dive deep into the current state of cybersecurity in healthcare, where the growing sophistication of cyber threats has led to increasingly devastating breaches. We begin with a close look at the rise of Ransomware-as-a-Service (RaaS), focusing on DragonForce, a ransomware group that has transitioned from politically motivated at…
…
continue reading

1
Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down the seismic implications of Google’s proposed $32 billion acquisition of Wiz, the world’s largest cybersecurity unicorn—and why this isn’t just another tech deal. At the core is the U.S. Department of Justice's antitrust investigation, triggered by concerns that the deal could tighten Google’s grip on a critical secto…
…
continue reading

1
SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms
1:03:42
1:03:42
Play later
Play later
Lists
Like
Liked
1:03:42In this critical episode, we dive into the alarming exploitation of CVE-2024-57727, a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) software actively leveraged by ransomware operators since early 2025. This isn't just a theoretical risk—it's already being used to compromise utility billing providers and downstream MSP customers…
…
continue reading

1
TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04In this episode, we dissect UNK_SneakyStrike—a major account takeover campaign targeting Microsoft Entra ID users with precision and scale. Tracked by Proofpoint, this campaign began in December 2024 and has since escalated, leveraging TeamFiltration, a legitimate penetration testing tool, to enumerate users and launch password spraying attacks tha…
…
continue reading

1
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit center stage with three high-severity vulnerabilities discovered in Tenable’s Nessus Agent for Windows. We break down CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, which, when exploited, allow a n…
…
continue reading

1
NB531: Cisco Spotlights AI, Unified Management at CLUS; Ultra Ethernet 1.0 Unveiled
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »…
…
continue reading

1
WestJet Cyberattack: Cracks in Aviation’s Digital Armor
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52A major cyberattack has rocked Canada's second-largest airline, WestJet—crippling internal systems and prompting warnings for customers to monitor their accounts and change passwords. But this is more than just a corporate incident. It’s the latest sign of a broader, escalating crisis in aviation cybersecurity. In this episode, we examine the WestJ…
…
continue reading

1
669: Peter Pistorius on Developing RedwoodSDK
1:07:06
1:07:06
Play later
Play later
Lists
Like
Liked
1:07:06Show Description We're chatting with Peter Pistorius about the change they made from RedwoodJS to RedwoodSDK, how it's going to handle routing, some new marketing ideas for RedwoodSDK, how RedwoodSDK's principles are informed by where Peter's from, choosing to go all in on Cloudflare, how the community has responded, and plans for monetization. Lis…
…
continue reading

1
Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37In this episode, we dig into a disturbing yet underreported national security threat: the exploitation of internet-connected surveillance cameras—especially those manufactured in the People’s Republic of China—as a cyber weapon against U.S. critical infrastructure. Drawing from recent DHS intelligence briefings and independent cybersecurity analyse…
…
continue reading

1
Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists
1:10:32
1:10:32
Play later
Play later
Lists
Like
Liked
1:10:32In this episode, we dive deep into the alarming revelations surrounding Graphite, a powerful spyware tool developed by Israeli firm Paragon Solutions. Promoted as a “responsible alternative” to the NSO Group’s Pegasus, Graphite is now implicated in the surveillance of journalists, humanitarian activists, and civil society figures—contrary to the ve…
…
continue reading

1
UK’s £1B AI Push, China’s 631GB Data Leak, and Robotic Exoskeletons
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43This week, we delve into the UK government’s substantial investment in AI infrastructure and its implications for cloud sovereignty; Is it related to the trump administration, the economy or the AI arms race? We discuss China’s unprecedented 631 GB personal data leak and whether it is a honeytrap or negligence. Plus, Wandercraft’s latest advancemen…
…
continue reading

1
zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51zeroRISC just raised $10 million to bring OpenTitan—the first open-source silicon Root of Trust—to market. In this episode, we break down what this funding means for the future of supply chain security, and why investors are betting on open hardware to fix vulnerabilities baked into modern chips. We explore how geopolitical tension, forced labor en…
…
continue reading

1
Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42The financial services industry is under siege. In this episode, we unpack the latest findings from Radware’s 2025 Financial Threat Analysis and multiple intelligence reports detailing a relentless rise in cyberattacks targeting banks and financial institutions across the globe. We examine the surge in sophisticated attacks that blend legitimate to…
…
continue reading

1
9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08In this episode, we break down Trend Micro’s urgent June 10th security update that patched ten high- and critical-severity vulnerabilities—some with CVSSv3.1 scores as high as 9.8—across Apex Central and Endpoint Encryption PolicyServer (TMEE). While no active exploitation has been observed, the risks are too severe to ignore. We spotlight the most…
…
continue reading

1
Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we dissect the critical vulnerabilities plaguing Mitel MiCollab, a widely used unified communications platform, and explore how attackers are exploiting these flaws in the wild. Recently, security researchers uncovered a trio of dangerous vulnerabilities, including CVE-2024-35286 (a SQL injection flaw), CVE-2024-41713 (an authentic…
…
continue reading

1
The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Join us for a gripping discussion on "Operation Secure," a landmark international crackdown that reverberated through the dark corners of the cybercriminal world between January and April 2025. Led by INTERPOL and involving law enforcement from 26 countries, primarily across the Asia-Pacific region, this massive coordinated effort, bolstered by cri…
…
continue reading

1
Dapr: The Secret Sauce to Simplifying Distributed Applications with Mark Fussell
1:09:47
1:09:47
Play later
Play later
Lists
Like
Liked
1:09:47RJJ Software's Software Development Service This episode of The Modern .NET Show is supported, in part, by RJJ Software's Software Development Services, whether your company is looking to elevate its UK operations or reshape its US strategy, we can provide tailored solutions that exceed expectations. Show Notes "Yeah, exactly. In fact, one of the c…
…
continue reading

1
Episode 523: Sterling Chin on APIs, AI, and Building MCP Servers
1:09:43
1:09:43
Play later
Play later
Lists
Like
Liked
1:09:43Brandon talks with Sterling Chin, Senior Developer Advocate at Postman, about building great APIs, why AI needs APIs, and what’s new at Postman. Plus, hear how he made the leap from 3rd-grade teacher to dev advocate. Watch the YouTube Live Recording of Episode 523 Episode Links Postman POST/CON Keynote Recap Postman Agent Mode Postman API Network P…
…
continue reading

1
SE Radio 672: Luca Palmieri on Rust In Production
57:46
57:46
Play later
Play later
Lists
Like
Liked
57:46Luca Palmieri, author of Zero to Production in Rust and Principal Engineering Consultant at MainMatter, speaks with SE Radio host Gavin Henry about Rust in production. They discuss what production Rust means, how to get Rust code into production, specific Rust issues to think about when getting an application into production, what Rust profiles are…
…
continue reading

1
Unlocking the holy grail of true ROAS measurement
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18In this episode of The Marketing Intelligence Show, Teck Goon (Reserata), Brent Banning (Pragmaticians), and Nora Hungershoefer (Supermetrics) unpack what it really takes to bring your online and offline marketing data together, optimize channel spend, and unlock the holy grail—true ROAS measurement. You’ll learn: Why marketing consolidation is cri…
…
continue reading

1
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a…
…
continue reading
On May 12, 2025, the Texas Department of Transportation (TxDOT) disclosed a significant data breach that compromised crash reports containing personal data of over 423,000 individuals. In this episode, we take a forensic look at what went wrong, how one compromised account enabled unauthorized downloads of sensitive crash data, and what this means …
…
continue reading

1
Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49What happens when hundreds of thousands of college applications are submitted—not by hopeful students, but by bots using stolen identities? In this episode, we dive deep into the alarming rise of financial aid fraud in U.S. higher education, driven by "ghost students" and increasingly sophisticated scams powered by AI. From fraud rings applying for…
…
continue reading

1
Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code
41:15
41:15
Play later
Play later
Lists
Like
Liked
41:15In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages, collectively downloaded over one million times per week, were silently weaponized with a Remote Access Trojan (RAT) embedded in obfuscated code. The attack, linked to the same threat actor behind the…
…
continue reading

1
Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in critical enterprise and IoT systems. The Mirai malware—still evolving nearly a decade after its first appearance—has adapted its tactics to weaponize recent CVEs with CVSS scores of 9.8 and 9.9, impa…
…
continue reading

1
UNFI Breach: How One Cyberattack Shook the North American Food Supply
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53On June 5, 2025, United Natural Foods Inc. (UNFI)—North America's largest publicly traded wholesale food distributor and primary supplier for Whole Foods—was struck by a major cyberattack that forced the company to shut down key IT systems. The result: widespread delivery disruptions to over 30,000 locations across the U.S. and Canada, eerily empty…
…
continue reading

1
NB530: Broadcom Hits 102.4 Tbps With Tomahawk 6; Wireshark Debuts Certificate Program
23:22
23:22
Play later
Play later
Lists
Like
Liked
23:22Take a Network Break! We start with two critical vulnerabilities: one affecting cloud versions of Cisco ISE, and the other for HPE StoreOnce. In the news, Broadcom announces the Tomahawk 6 ASIC with 102.4Tbits of bandwidth, SentinelOne suffers a self-imposed network outage, and the Wireshark Foundation announces its first-ever professional certific…
…
continue reading

1
668: Jake Archibald on Native HTML Includes
1:05:24
1:05:24
Play later
Play later
Lists
Like
Liked
1:05:24Show Description Jake Archibald joins us to discuss HTML includes, potential solutions, and the implications of introducing such a feature. We talk about security concerns, performance implications, and community feedback regarding HTML imports. Listen on Website → Guests Jake Archibald Guest's Main URL • Guest's Social Engineer at Shopify. Once sw…
…
continue reading

1
Malware-as-Code: The Rise of DaaS on GitHub and the Collapse of Open-Source Trust
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46In this episode, we dissect one of the most sophisticated ongoing cybercrime trends—malware campaigns weaponizing GitHub repositories to compromise developers, gamers, and even rival hackers. By abusing GitHub’s search functionality and reputation signals, threat actors are pushing backdoored code under the guise of popular tools, game cheats, and …
…
continue reading

1
Heroku + MCP = The Fastest Way to Run AI Agents in the Cloud
41:23
41:23
Play later
Play later
Lists
Like
Liked
41:23Julián Duque from Heroku joins me to explain and demo their new AI platform. Check out the video podcast version here https://youtu.be/BGqlLZHdRDs Creators & Guests Cristi Cotovan - Editor Bret Fisher - Host Beth Fisher - Producer Julián Duque - Guest You can also support my content by subscribing to my YouTube channel and my weekly newsletter at b…
…
continue reading

1
From Paper to Paperless: Why 2025 is the Year for Smarter New Patient Dental Forms
4:13
4:13
Play later
Play later
Lists
Like
Liked
4:13please visit : https://adit.com/go-paperless-why-2025-new-patient-dental-forms?utm_source=organic&utm_medium=google_organic&utm_campaign=podcastrj Upgrade your dental practice with paperless New Patient Dental Forms. Improve efficiency, accuracy, and patient experience while reducing costs in 2025.
…
continue reading
This week, we discuss Apple reversioning macOS, the steady state of private cloud, and Snowflake’s acquisition of CrunchyData. Plus, the eternal quest for a 5-star Uber rating. Watch the YouTube Live Recording of Episode 522 Runner-up Titles Saudi crypto money You know what humans like? Buses I think we need 10 stars Snow lion Maslow’s hierarchy of…
…
continue reading