Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A Podcast for Marvel Crisis Protocol, a tabletop miniatures game from Atomic Mass Games. HPP covers newly revealed characters with in-depth reviews of all of their abilities in an easy to digest format. HPP also dives deep on tactics and ways you can improve your competitive play, all while focusing on welcoming players of all skill levels. MCP is meant to be FUN and that’s what HPP likes to bring! Enjoy!
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Technical interviews about software topics.
…
continue reading

1
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and operational efficiency. Equipped with advanced sensors, TempGenius monitors critical metrics including temperature, humidity, air pressure, CO₂ leve ...
…
continue reading
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
…
continue reading
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Award-winning investigative journalist John Solomon, who helped unravel the bogus Russia collusion scandal, gives you his exclusive reporting and big newsmaker interviews. To get the unvarnished truth about what’s really going on in Washington, subscribe today to John Solomon Reports. To find out more go to https://justthenews.com
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
This podcast is dedicated to helping all humans find a prosperous life. The host Jim Johnson has been using his "Prosperity Protocol" for more than a decade to find balance and fulfillment in a chaotic ever changing world. Guests on the show will be focused on the 7 pillars of the "Prosperity Protocol", Work Fulfillment, Time & Financial Security, Community, Health & Performance, Leadership, Creativity & Curiosity, Spiritual Growth & Development. They will share life experience, practical ap ...
…
continue reading
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
…
continue reading
This podcast features all things related to Information Security and Cyber Security
…
continue reading
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
…
continue reading
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
Health Unchained dives into healthcare projects enabled by blockchain technology. Listen to healthcare leaders, executives, entrepreneurs, researchers, and medical professionals who share their insights and experience.
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Exploring cross-chain composability in a multi-chain world. Composable is a bi-weekly podcast hosted by Alysia and Ellie. Brought to you by Espresso Pods.
…
continue reading
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
…
continue reading
Henri Arslanian brings you in-depth discussions and constructive analyses of the developments shaping the future of money and finance from Bitcoin and cryptocurrencies to CBDCs and DeFi
…
continue reading
deep dive into Data-as-a-Service (DaaS) businesses. World of DaaS is a podcast for data enthusiasts, by data enthusiasts, where Auren Hoffman talks to business and technology leaders about all things data - building it, acquiring it, analyzing it, and everything in between.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
A podcast about the people who keep you safe at events and beyond.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
…
continue reading
### **Bitunix Referral Code ”d1c9qu” – Claim 5500 USDT Bonus and 10% Fee Discount** Bitunix referral code **”d1c9qu”** offers new users a powerful way to boost their trading experience right from the start. By using this code during registration, you can unlock **up to 5500 USDT in bonuses** and enjoy a **10% discount on all trading fees**. Bitunix is designed for traders who want a secure, efficient, and rewarding environment, making it a top choice for both beginners and professionals. ## ...
…
continue reading

1
Cybermindz’s Mark Alba on Military PTSD Protocols to Treat Security Burnout
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04The cybersecurity industry has talked extensively about burnout, but Mark Alba, Managing Director of Cybermindz, is taking an unprecedented scientific approach to both measuring and treating it. In this special RSA episode, Mark tells David how his team applies military-grade psychological protocols originally developed for PTSD treatment to addres…
…
continue reading

1
SED News: Corporate Spies, Postgres, and the Weird Life of Devs Right Now
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39Welcome back to SED News, a podcast series from Software Engineering Daily where hosts Gregor Vand and Sean Falconer break down the latest stories in software engineering, Silicon Valley, and wider tech world. In this episode, Gregor and Sean unpack what’s going with Deel and Rippling, explore why Databricks and Snowflake are making big bets on Pos…
…
continue reading

1
Congressman Biggs on America’s Response to Violence and Protests "the American people have had enough of it."
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40Congressman Andy Biggs from Arizona unpacks the recent protests and the political climate surrounding them. Congressman Biggs shares insights into the funding behind these protests, the impact of President Trump's policies, and the disconnect between the Democratic party and middle America. Congresswoman Mariannette Miller-Meeks shares her insights…
…
continue reading
Lukas Mathis tells us to stop uploading our data to Google, Robert Vitonsky wants web devs to not guess his language using his IP, Tom from GameTorch reminds us that software talent is gold right now, Austin Parker from Honeycomb describes how LLMs are upending the observability industry, and Vitess co-creator, Sugu Sougoumarane, joins Supabase to …
…
continue reading

1
#237 - Build a World Class SOC (with Carson Zimmerman)
41:41
41:41
Play later
Play later
Lists
Like
Liked
41:41Join G Mark Hardy and Carson Zimmerman, the author of '11 Strategies of a World-Class Cybersecurity Operations Center,' in this insightful episode of CISO Tradecraft. Carson shares his career journey, the evolution from the 10 to 11 strategies, and delves into the future needs of Security Operations Centers (SOCs). They discuss critical topics such…
…
continue reading

1
CCT 254: Understanding APIs for the CISSP Exam (Domain 8.5)
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Send us a text Cybersecurity vulnerabilities continue to emerge in unexpected places, as evidenced by the recent Iranian-backed attacks on U.S. water treatment facilities through poorly secured Unitronics PLCs. This alarming development sets the stage for our deep dive into API security - a critical yet often overlooked aspect of modern cybersecuri…
…
continue reading

1
CAP Theorem Explained: Choosing the Right Database for Distributed Systems
15:25
15:25
Play later
Play later
Lists
Like
Liked
15:25CAP Theorem Explained: Choosing the Right Database for Distributed Systems https://knowledge.businesscompassllc.com/cap-theorem-explained-choosing-the-right-database-for-distributed-systems/ Ever spent an entire weekend debugging a distributed database issue only to discover it’s not a bug but a fundamental trade-off you never considered? You’re no…
…
continue reading

1
Centralized vs Distributed Systems: Key Concepts Explained with Java Example
18:10
18:10
Play later
Play later
Lists
Like
Liked
18:10Centralized vs Distributed Systems: Key Concepts Explained with Java Example https://knowledge.businesscompassllc.com/centralized-vs-distributed-systems-key-concepts-explained-with-java-example/ Ever spent hours debugging a distributed system only to wish you’d gone with a simpler centralized approach? Or maybe you built a monolith that’s now buckl…
…
continue reading

1
Elastic Scaling with Consistent Hashing: How to Manage Dynamic Database Sharding
19:13
19:13
Play later
Play later
Lists
Like
Liked
19:13Elastic Scaling with Consistent Hashing: How to Manage Dynamic Database Sharding https://knowledge.businesscompassllc.com/elastic-scaling-with-consistent-hashing-how-to-manage-dynamic-database-sharding/ Remember that time your database buckled under sudden traffic and your engineering team spent the weekend fighting fires? Yeah, database scalabilit…
…
continue reading

1
Hashing Explained: From Message Digests to Load Balancing
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40Hashing Explained: From Message Digests to Load Balancing https://knowledge.businesscompassllc.com/hashing-explained-from-message-digests-to-load-balancing/ Ever sat staring at your screen, wondering how your bank’s website instantly recognizes your password without actually storing it anywhere? Or how Spotify somehow knows which server should hand…
…
continue reading

1
Network Protocols Demystified: How They Enable Communication Across Devices
12:26
12:26
Play later
Play later
Lists
Like
Liked
12:26Network Protocols Demystified: How They Enable Communication Across Devices https://knowledge.businesscompassllc.com/network-protocols-demystified-how-they-enable-communication-across-devices/ Ever tried explaining to your mom why Netflix buffers but YouTube doesn’t? Welcome to the invisible world of network protocols – the digital traffic cops det…
…
continue reading

1
Mastering Load Balancing: Key Concepts for High-Traffic Websites
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58Mastering Load Balancing: Key Concepts for High-Traffic Websites https://knowledge.businesscompassllc.com/mastering-load-balancing-key-concepts-for-high-traffic-websites/ Ever had your website crumble under a traffic spike that should’ve been your biggest win? You’re not alone. A stunning 68% of development teams have watched their systems collapse…
…
continue reading

1
Latency vs Throughput: Key Differences Explained for System Design
14:49
14:49
Play later
Play later
Lists
Like
Liked
14:49Latency vs Throughput: Key Differences Explained for System Design https://knowledge.businesscompassllc.com/latency-vs-throughput-key-differences-explained-for-system-design/ Ever spent hours optimizing your system only to realize you’ve been chasing the wrong metric? That was me last month, knee-deep in server logs, optimizing for throughput when …
…
continue reading

1
Understanding Client-Server Architecture: A Foundation for Web Applications
19:03
19:03
Play later
Play later
Lists
Like
Liked
19:03Understanding Client-Server Architecture: A Foundation for Web Applications https://knowledge.businesscompassllc.com/understanding-client-server-architecture-a-foundation-for-web-applications/ Ever sat there staring at a browser, wondering what invisible magic happens when you click a link? You’re not alone. Behind every web application is a dance …
…
continue reading

1
Write-Thru vs. Write-Back Caching: Understanding Key Caching Techniques
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21Write-Thru vs. Write-Back Caching: Understanding Key Caching Techniques https://knowledge.businesscompassllc.com/write-thru-vs-write-back-caching-understanding-key-caching-techniques/ Ever find yourself standing in the grocery store staring at two seemingly identical products, completely frozen by indecision? That’s exactly how many developers feel…
…
continue reading

1
Unlocking the Secrets of Polling vs. Streaming for System Design Success
14:20
14:20
Play later
Play later
Lists
Like
Liked
14:20Unlocking the Secrets of Polling vs. Streaming for System Design Success https://knowledge.businesscompassllc.com/unlocking-the-secrets-of-polling-vs-streaming-for-system-design-success/ Ever sat in a design review where someone casually drops “we should use polling here” and everyone nods knowingly while you’re thinking, “wait, what’s wrong with s…
…
continue reading

1
SOON Stack | Build on Solana, Deploy Everywhere with CEO Joanna Zeng
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10What if you could bring Solana’s speed to every major blockchain—and onboard millions of new users with zero friction? In this new episode of The Index, host Alex Kehaya welcomes back Joanna Zeng, Co-founder & CEO of SOON, for an exciting update on how her team is breaking down the walls between blockchain ecosystems and building the infrastructure…
…
continue reading

1
Sanctuary Governors: Ignoring the Consequences of Their Policies
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27Governors Kathy Hochul, J.B. Pritzker, and Tim Walz testified before the House Oversight Committee regarding their sanctuary state policies. Congressman Eric Burlison joins to discuss the implications of these policies, the recent funding rescissions, and the growing public support for President Trump's immigration measures. Retired Colonel Pete Me…
…
continue reading

1
Tensions Rise: Israel's Bold Strikes on Iran's Nuclear Facilities
40:42
40:42
Play later
Play later
Lists
Like
Liked
40:42Israel conducted preemptive strikes on Iran's nuclear facilities, dubbed Operation Rising Lion. National security expert E.J. Kimball says "this is a seminal moment for the Middle East and for the world." Kimball discusses the implications of these actions, the historical context of Iran's nuclear ambitions, and the potential for a regime change in…
…
continue reading

1
Israel's Bold Move: The Attack That Shook Iran and the Rising Threat of Antisemitism
47:56
47:56
Play later
Play later
Lists
Like
Liked
47:56Congressman Zach Nunn, a combat veteran and former intelligence officer, shares insights on the threats posed by China, particularly in the realm of agricultural espionage, and the recent military actions involving Iran and Israel. Fred Fleitz, former chief of staff for the National Security Council, provides insights into the intelligence and mili…
…
continue reading

1
Deribit CEO on Coinbase’s $2.9B Buyout and the Next Era for Crypto Options
34:15
34:15
Play later
Play later
Lists
Like
Liked
34:15In this episode of the Future of Money podcast, I sat down with Luuk Strijers, CEO of Deribit, to discuss their landmark $2.9 billion acquisition by Coinbase. We explore what this means for crypto options, institutional adoption, the evolving landscape of collateral in crypto derivatives, and how regulatory clarity is reshaping the market. A must-w…
…
continue reading

1
Saltiness about frostiness (Friends)
2:07:01
2:07:01
Play later
Play later
Lists
Like
Liked
2:07:01Justin Searls joins Jerod in Apple’s WWDC wake for hot takes about frosty UIs. We go (almost) point-by-point through the keynote, dissecting and reacting along the way. Concentricity! Join the discussion Changelog++ members save 5 minutes on this episode because they made the ads disappear. Join today! Sponsors: Retool – Assemble your elite AI team…
…
continue reading

1
HN785: How To Take Your First Steps Into Network Automation
55:50
55:50
Play later
Play later
Lists
Like
Liked
55:50There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade,... Read more »…
…
continue reading

1
Bitcoin as Pristine Collateral: Risk Redefined. @PeoplesReserve with @CJKonstantinos
20:31
20:31
Play later
Play later
Lists
Like
Liked
20:31During the darkest days of the last bear market, 5 years ago, I met my friend and guest @CJKonstantinos at The Green Flash in Florida. This guy is the definition of OG by doubling down and starting @peoplesreserve. He's creating Bitcoin-backed financial products that are reshaping the way we think about money. Tomorrow we are both speaking at Bitco…
…
continue reading

1
What Is Pub/Sub? Publish-Subscribe Architecture for Scalable Systems
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09What Is Pub/Sub? Publish-Subscribe Architecture for Scalable Systems https://knowledge.businesscompassllc.com/what-is-pub-sub-publish-subscribe-architecture-for-scalable-systems/ Remember the last time your app crashed because too many users showed up at once? Yeah, that kind of pain stays with you. Pub/Sub architecture might be the relief you need…
…
continue reading

1
Master Sharding: A Key Strategy for Scalable System Design
15:37
15:37
Play later
Play later
Lists
Like
Liked
15:37Master Sharding: A Key Strategy for Scalable System Design https://knowledge.businesscompassllc.com/master-sharding-a-key-strategy-for-scalable-system-design/ Your database crashed at 3 AM and you’re frantically Googling solutions while your boss texts, “Any updates?” Sound familiar? When systems buckle under growing data loads, smart engineers don…
…
continue reading

1
System Design Prep: Understanding Relational Databases in Minutes
12:29
12:29
Play later
Play later
Lists
Like
Liked
12:29System Design Prep: Understanding Relational Databases in Minutes https://knowledge.businesscompassllc.com/system-design-prep-understanding-relational-databases-in-minutes/ Ever stared at a system design question about databases and felt your stomach drop? You’re not alone. Thousands of developers freeze when interviewers casually ask, “So how woul…
…
continue reading

1
System Design Basics: ACID Transactions & Indexes Demystified
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34System Design Basics: ACID Transactions & Indexes Demystified https://knowledge.businesscompassllc.com/system-design-basics-acid-transactions-indexes-demystified/ Ever sat in a technical interview where they asked about ACID transactions, and your mind went completely blank? You’re not alone. For countless software engineers and developers, databas…
…
continue reading

1
Key-Value Databases Explained: Faster, Simpler Alternatives to RDBMS in System Design
11:09
11:09
Play later
Play later
Lists
Like
Liked
11:09Key-Value Databases Explained: Faster, Simpler Alternatives to RDBMS in System Design https://knowledge.businesscompassllc.com/key-value-databases-explained-faster-simpler-alternatives-to-rdbms-in-system-design/ Ever spent three days debugging a relational database query that should’ve taken seconds? You’re not alone. While SQL databases have power…
…
continue reading

1
Understanding BLOB, Time Series & Graph Databases – System Design Basics
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43Understanding BLOB, Time Series & Graph Databases – System Design Basics https://knowledge.businesscompassllc.com/understanding-blob-time-series-graph-databases-system-design-basics/ Ever sat through a database architecture meeting where everyone’s nodding along, but you’re secretly Googling “BLOB vs. Graph database” under the table? Don’t worry—78…
…
continue reading
CI/CD Pipeline System Design Walkthrough https://knowledge.businesscompassllc.com/ci-cd-pipeline-system-design-walkthrough/ Ever stared at your terminal watching a deployment fail for the 47th time while your deadline creeps closer? Yeah, I thought so. We’ve all been there. The reality is that most engineering teams are still cobbling together depl…
…
continue reading

1
Peer-to-Peer Network Architecture Explained with Kraken (System Design Prep)
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12Peer-to-Peer Network Architecture Explained with Kraken (System Design Prep) https://knowledge.businesscompassllc.com/peer-to-peer-network-architecture-explained-with-kraken-system-design-prep/ Ever caught yourself wondering how Bitcoin actually works under the hood? Not the price speculation stuff, but the actual tech plumbing that keeps it runnin…
…
continue reading

1
System Design Deep Dive: Leader Election Algorithms You Should Know
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43System Design Deep Dive: Leader Election Algorithms You Should Know https://knowledge.businesscompassllc.com/system-design-deep-dive-leader-election-algorithms-you-should-know/ Ever had your entire system crash because nobody could figure out who’s in charge? Distributed systems engineers know this particular flavor of pain all too well — one minut…
…
continue reading

1
Mastering WebSockets: How It Compares to Polling for Scalable System Design
20:15
20:15
Play later
Play later
Lists
Like
Liked
20:15Mastering WebSockets: How It Compares to Polling for Scalable System Design https://knowledge.businesscompassllc.com/mastering-websockets-how-it-compares-to-polling-for-scalable-system-design/ Ever sat watching that spinning wheel as your app tries to update, wondering if your server fell asleep? You’re not alone. Developers everywhere are caught i…
…
continue reading

1
SE Radio 672: Luca Palmieri on Rust In Production
57:46
57:46
Play later
Play later
Lists
Like
Liked
57:46Luca Palmieri, author of Zero to Production in Rust and Principal Engineering Consultant at MainMatter, speaks with SE Radio host Gavin Henry about Rust in production. They discuss what production Rust means, how to get Rust code into production, specific Rust issues to think about when getting an application into production, what Rust profiles are…
…
continue reading

1
Congressman Biggs: The Disconnect Between Democrats and Middle America
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43Congressman Andy Biggs from Arizona shares his insights on the current political climate, the unrest in America, and the support for President Trump's policies. He discusses the disconnect between the Democrats and Middle America, the implications of recent protests, and the importance of law and order. Congressman Marlin Stutzman discusses the imp…
…
continue reading

1
Digital Asset Redemption's Steve Baer on Why Half of Ransomware Victims Shouldn't Pay
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Most organizations approach ransomware as a technical problem, but Steve Baer, Field CISO at Digital Asset Redemption, has built his career understanding it as fundamentally human. His team's approach highlights why traditional cybersecurity tools fall short against motivated human adversaries and how proactive intelligence gathering can prevent in…
…
continue reading

1
CCT 253: Practice CISSP Questions - Conduct logging and monitoring activities (Domain 7.2)
25:09
25:09
Play later
Play later
Lists
Like
Liked
25:09Send us a text Security professionals face a constant battle to keep up with evolving threats, and our latest CISSP Question Thursday podcast delivers critical insights into one of the most fundamental cybersecurity capabilities: effective logging and monitoring. The episode begins with a warning about a sophisticated attack campaign targeting recr…
…
continue reading

1
TanStack and the Future of Frontend with Tanner Linsley
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13TanStack is an open-source collection of high-performance libraries for JavaScript and TypeScript applications, primarily focused on state management, data fetching, and table utilities. It includes popular libraries like TanStack Query, TanStack Table, and TanStack Router. These libraries emphasize declarative APIs, optimized performance, and deve…
…
continue reading

1
How to Design a Chat Application: Step-by-Step System Design Guide
17:56
17:56
Play later
Play later
Lists
Like
Liked
17:56How to Design a Chat Application: Step-by-Step System Design Guide https://knowledge.businesscompassllc.com/how-to-design-a-chat-application-step-by-step-system-design-guide/ Ever sat in a technical interview where they asked you to design a chat app, and your mind went completely blank? Yeah, that’s the moment when all those hours of coding someho…
…
continue reading

1
System Design Deep Dive: The Architecture Behind Twitter's Scale
19:47
19:47
Play later
Play later
Lists
Like
Liked
19:47System Design Deep Dive: The Architecture Behind Twitter's Scale https://knowledge.businesscompassllc.com/system-design-deep-dive-the-architecture-behind-twitters-scale/ Ever wondered how Twitter processes 500 million tweets every day without crumbling? That’s roughly 5,800 tweets per second, and somehow your feed still loads in milliseconds. Behin…
…
continue reading

1
Master HTTPS and Security Principles for Scalable System Design
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Master HTTPS and Security Principles for Scalable System Design https://knowledge.businesscompassllc.com/master-https-and-security-principles-for-scalable-system-design/ Ever tapped “submit” on a payment form and then wondered if hackers were watching? You’re not alone. Software engineers everywhere face the same gut-punch anxiety about protecting …
…
continue reading

1
Mastering MapReduce: The Key to Cracking System Design Questions
13:16
13:16
Play later
Play later
Lists
Like
Liked
13:16Mastering MapReduce: The Key to Cracking System Design Questions https://knowledge.businesscompassllc.com/mastering-mapreduce-the-key-to-cracking-system-design-questions/ Ever bombed a system design interview because you couldn’t explain how to process 10TB of data? You’re not alone. I’ve watched brilliant engineers crumble when asked to scale beyo…
…
continue reading

1
What Powers ChatGPT? A Peek into OpenAI’s Language Model Magic
14:15
14:15
Play later
Play later
Lists
Like
Liked
14:15What Powers ChatGPT? A Peek into OpenAI’s Language Model Magic https://knowledge.businesscompassllc.com/what-powers-chatgpt-a-peek-into-openais-language-model-magic/ Remember that time you asked ChatGPT a question and it responded like it was reading your mind? Or maybe it left you scratching your head instead. Either way, you’ve probably wondered:…
…
continue reading

1
Designing for Scale: Understanding the Scale Cube in Microservices Architecture
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Designing for Scale: Understanding the Scale Cube in Microservices Architecture https://knowledge.businesscompassllc.com/designing-for-scale-understanding-the-scale-cube-in-microservices-architecture/ Remember when you were debugging that 2 AM production issue, and your microservices architecture that seemed so elegant in the whiteboard session was…
…
continue reading