show episodes
 
A Podcast for Marvel Crisis Protocol, a tabletop miniatures game from Atomic Mass Games. HPP covers newly revealed characters with in-depth reviews of all of their abilities in an easy to digest format. HPP also dives deep on tactics and ways you can improve your competitive play, all while focusing on welcoming players of all skill levels. MCP is meant to be FUN and that’s what HPP likes to bring! Enjoy!
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Artwork

1
CISO Tradecraft®

CISO Tradecraft®

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
  continue reading
 
Artwork

1
The Trident

U.S. Naval War College

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
  continue reading
 
Artwork

1
Wireless Environmental Monitor

freezer temperature monitoring

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and operational efficiency. Equipped with advanced sensors, TempGenius monitors critical metrics including temperature, humidity, air pressure, CO₂ leve ...
  continue reading
 
Artwork

1
The Pirate Pod

Arrington Capital

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
  continue reading
 
Artwork

1
Bloom Fireside

Bloom Protocol

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Award-winning investigative journalist John Solomon, who helped unravel the bogus Russia collusion scandal, gives you his exclusive reporting and big newsmaker interviews. To get the unvarnished truth about what’s really going on in Washington, subscribe today to John Solomon Reports. To find out more go to https://justthenews.com
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
This podcast is dedicated to helping all humans find a prosperous life. The host Jim Johnson has been using his "Prosperity Protocol" for more than a decade to find balance and fulfillment in a chaotic ever changing world. Guests on the show will be focused on the 7 pillars of the "Prosperity Protocol", Work Fulfillment, Time & Financial Security, Community, Health & Performance, Leadership, Creativity & Curiosity, Spiritual Growth & Development. They will share life experience, practical ap ...
  continue reading
 
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
  continue reading
 
Artwork
 
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Artwork

1
Almost Diplomatic

Almost Diplomatic

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
  continue reading
 
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
  continue reading
 
Artwork

1
Cryptography FM

Symbolic Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
Health Unchained Podcast

Health Unchained Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Health Unchained dives into healthcare projects enabled by blockchain technology. Listen to healthcare leaders, executives, entrepreneurs, researchers, and medical professionals who share their insights and experience.
  continue reading
 
Artwork

1
Resilient Cyber

Chris Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
  continue reading
 
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
  continue reading
 
Artwork

1
The Index Podcast

Index Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
  continue reading
 
Artwork

1
"World of DaaS"

Word of DaaS with Auren Hoffman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
deep dive into Data-as-a-Service (DaaS) businesses. World of DaaS is a podcast for data enthusiasts, by data enthusiasts, where Auren Hoffman talks to business and technology leaders about all things data - building it, acquiring it, analyzing it, and everything in between.
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
Artwork

1
Heavy Networking

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
  continue reading
 
### **Bitunix Referral Code ”d1c9qu” – Claim 5500 USDT Bonus and 10% Fee Discount** Bitunix referral code **”d1c9qu”** offers new users a powerful way to boost their trading experience right from the start. By using this code during registration, you can unlock **up to 5500 USDT in bonuses** and enjoy a **10% discount on all trading fees**. Bitunix is designed for traders who want a secure, efficient, and rewarding environment, making it a top choice for both beginners and professionals. ## ...
  continue reading
 
Loading …
show series
 
The cybersecurity industry has talked extensively about burnout, but Mark Alba, Managing Director of Cybermindz, is taking an unprecedented scientific approach to both measuring and treating it. In this special RSA episode, Mark tells David how his team applies military-grade psychological protocols originally developed for PTSD treatment to addres…
  continue reading
 
Welcome back to SED News, a podcast series from Software Engineering Daily where hosts Gregor Vand and Sean Falconer break down the latest stories in software engineering, Silicon Valley, and wider tech world. In this episode, Gregor and Sean unpack what’s going with Deel and Rippling, explore why Databricks and Snowflake are making big bets on Pos…
  continue reading
 
Congressman Andy Biggs from Arizona unpacks the recent protests and the political climate surrounding them. Congressman Biggs shares insights into the funding behind these protests, the impact of President Trump's policies, and the disconnect between the Democratic party and middle America. Congresswoman Mariannette Miller-Meeks shares her insights…
  continue reading
 
Lukas Mathis tells us to stop uploading our data to Google, Robert Vitonsky wants web devs to not guess his language using his IP, Tom from GameTorch reminds us that software talent is gold right now, Austin Parker from Honeycomb describes how LLMs are upending the observability industry, and Vitess co-creator, Sugu Sougoumarane, joins Supabase to …
  continue reading
 
Join G Mark Hardy and Carson Zimmerman, the author of '11 Strategies of a World-Class Cybersecurity Operations Center,' in this insightful episode of CISO Tradecraft. Carson shares his career journey, the evolution from the 10 to 11 strategies, and delves into the future needs of Security Operations Centers (SOCs). They discuss critical topics such…
  continue reading
 
Send us a text Cybersecurity vulnerabilities continue to emerge in unexpected places, as evidenced by the recent Iranian-backed attacks on U.S. water treatment facilities through poorly secured Unitronics PLCs. This alarming development sets the stage for our deep dive into API security - a critical yet often overlooked aspect of modern cybersecuri…
  continue reading
 
CAP Theorem Explained: Choosing the Right Database for Distributed Systems https://knowledge.businesscompassllc.com/cap-theorem-explained-choosing-the-right-database-for-distributed-systems/ Ever spent an entire weekend debugging a distributed database issue only to discover it’s not a bug but a fundamental trade-off you never considered? You’re no…
  continue reading
 
Centralized vs Distributed Systems: Key Concepts Explained with Java Example https://knowledge.businesscompassllc.com/centralized-vs-distributed-systems-key-concepts-explained-with-java-example/ Ever spent hours debugging a distributed system only to wish you’d gone with a simpler centralized approach? Or maybe you built a monolith that’s now buckl…
  continue reading
 
Elastic Scaling with Consistent Hashing: How to Manage Dynamic Database Sharding https://knowledge.businesscompassllc.com/elastic-scaling-with-consistent-hashing-how-to-manage-dynamic-database-sharding/ Remember that time your database buckled under sudden traffic and your engineering team spent the weekend fighting fires? Yeah, database scalabilit…
  continue reading
 
Hashing Explained: From Message Digests to Load Balancing https://knowledge.businesscompassllc.com/hashing-explained-from-message-digests-to-load-balancing/ Ever sat staring at your screen, wondering how your bank’s website instantly recognizes your password without actually storing it anywhere? Or how Spotify somehow knows which server should hand…
  continue reading
 
Network Protocols Demystified: How They Enable Communication Across Devices https://knowledge.businesscompassllc.com/network-protocols-demystified-how-they-enable-communication-across-devices/ Ever tried explaining to your mom why Netflix buffers but YouTube doesn’t? Welcome to the invisible world of network protocols – the digital traffic cops det…
  continue reading
 
Mastering Load Balancing: Key Concepts for High-Traffic Websites https://knowledge.businesscompassllc.com/mastering-load-balancing-key-concepts-for-high-traffic-websites/ Ever had your website crumble under a traffic spike that should’ve been your biggest win? You’re not alone. A stunning 68% of development teams have watched their systems collapse…
  continue reading
 
Latency vs Throughput: Key Differences Explained for System Design https://knowledge.businesscompassllc.com/latency-vs-throughput-key-differences-explained-for-system-design/ Ever spent hours optimizing your system only to realize you’ve been chasing the wrong metric? That was me last month, knee-deep in server logs, optimizing for throughput when …
  continue reading
 
Understanding Client-Server Architecture: A Foundation for Web Applications https://knowledge.businesscompassllc.com/understanding-client-server-architecture-a-foundation-for-web-applications/ Ever sat there staring at a browser, wondering what invisible magic happens when you click a link? You’re not alone. Behind every web application is a dance …
  continue reading
 
Write-Thru vs. Write-Back Caching: Understanding Key Caching Techniques https://knowledge.businesscompassllc.com/write-thru-vs-write-back-caching-understanding-key-caching-techniques/ Ever find yourself standing in the grocery store staring at two seemingly identical products, completely frozen by indecision? That’s exactly how many developers feel…
  continue reading
 
Unlocking the Secrets of Polling vs. Streaming for System Design Success https://knowledge.businesscompassllc.com/unlocking-the-secrets-of-polling-vs-streaming-for-system-design-success/ Ever sat in a design review where someone casually drops “we should use polling here” and everyone nods knowingly while you’re thinking, “wait, what’s wrong with s…
  continue reading
 
What if you could bring Solana’s speed to every major blockchain—and onboard millions of new users with zero friction? In this new episode of The Index, host Alex Kehaya welcomes back Joanna Zeng, Co-founder & CEO of SOON, for an exciting update on how her team is breaking down the walls between blockchain ecosystems and building the infrastructure…
  continue reading
 
Governors Kathy Hochul, J.B. Pritzker, and Tim Walz testified before the House Oversight Committee regarding their sanctuary state policies. Congressman Eric Burlison joins to discuss the implications of these policies, the recent funding rescissions, and the growing public support for President Trump's immigration measures. Retired Colonel Pete Me…
  continue reading
 
Israel conducted preemptive strikes on Iran's nuclear facilities, dubbed Operation Rising Lion. National security expert E.J. Kimball says "this is a seminal moment for the Middle East and for the world." Kimball discusses the implications of these actions, the historical context of Iran's nuclear ambitions, and the potential for a regime change in…
  continue reading
 
Congressman Zach Nunn, a combat veteran and former intelligence officer, shares insights on the threats posed by China, particularly in the realm of agricultural espionage, and the recent military actions involving Iran and Israel. Fred Fleitz, former chief of staff for the National Security Council, provides insights into the intelligence and mili…
  continue reading
 
In this episode of the Future of Money podcast, I sat down with Luuk Strijers, CEO of Deribit, to discuss their landmark $2.9 billion acquisition by Coinbase. We explore what this means for crypto options, institutional adoption, the evolving landscape of collateral in crypto derivatives, and how regulatory clarity is reshaping the market. A must-w…
  continue reading
 
Justin Searls joins Jerod in Apple’s WWDC wake for hot takes about frosty UIs. We go (almost) point-by-point through the keynote, dissecting and reacting along the way. Concentricity! Join the discussion Changelog++ members save 5 minutes on this episode because they made the ads disappear. Join today! Sponsors: Retool – Assemble your elite AI team…
  continue reading
 
There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade,... Read more »…
  continue reading
 
During the darkest days of the last bear market, 5 years ago, I met my friend and guest @CJKonstantinos at The Green Flash in Florida. This guy is the definition of OG by doubling down and starting @peoplesreserve. He's creating Bitcoin-backed financial products that are reshaping the way we think about money. Tomorrow we are both speaking at Bitco…
  continue reading
 
What Is Pub/Sub? Publish-Subscribe Architecture for Scalable Systems https://knowledge.businesscompassllc.com/what-is-pub-sub-publish-subscribe-architecture-for-scalable-systems/ Remember the last time your app crashed because too many users showed up at once? Yeah, that kind of pain stays with you. Pub/Sub architecture might be the relief you need…
  continue reading
 
Master Sharding: A Key Strategy for Scalable System Design https://knowledge.businesscompassllc.com/master-sharding-a-key-strategy-for-scalable-system-design/ Your database crashed at 3 AM and you’re frantically Googling solutions while your boss texts, “Any updates?” Sound familiar? When systems buckle under growing data loads, smart engineers don…
  continue reading
 
System Design Prep: Understanding Relational Databases in Minutes https://knowledge.businesscompassllc.com/system-design-prep-understanding-relational-databases-in-minutes/ Ever stared at a system design question about databases and felt your stomach drop? You’re not alone. Thousands of developers freeze when interviewers casually ask, “So how woul…
  continue reading
 
System Design Basics: ACID Transactions & Indexes Demystified https://knowledge.businesscompassllc.com/system-design-basics-acid-transactions-indexes-demystified/ Ever sat in a technical interview where they asked about ACID transactions, and your mind went completely blank? You’re not alone. For countless software engineers and developers, databas…
  continue reading
 
Key-Value Databases Explained: Faster, Simpler Alternatives to RDBMS in System Design https://knowledge.businesscompassllc.com/key-value-databases-explained-faster-simpler-alternatives-to-rdbms-in-system-design/ Ever spent three days debugging a relational database query that should’ve taken seconds? You’re not alone. While SQL databases have power…
  continue reading
 
Understanding BLOB, Time Series & Graph Databases – System Design Basics https://knowledge.businesscompassllc.com/understanding-blob-time-series-graph-databases-system-design-basics/ Ever sat through a database architecture meeting where everyone’s nodding along, but you’re secretly Googling “BLOB vs. Graph database” under the table? Don’t worry—78…
  continue reading
 
CI/CD Pipeline System Design Walkthrough https://knowledge.businesscompassllc.com/ci-cd-pipeline-system-design-walkthrough/ Ever stared at your terminal watching a deployment fail for the 47th time while your deadline creeps closer? Yeah, I thought so. We’ve all been there. The reality is that most engineering teams are still cobbling together depl…
  continue reading
 
Peer-to-Peer Network Architecture Explained with Kraken (System Design Prep) https://knowledge.businesscompassllc.com/peer-to-peer-network-architecture-explained-with-kraken-system-design-prep/ Ever caught yourself wondering how Bitcoin actually works under the hood? Not the price speculation stuff, but the actual tech plumbing that keeps it runnin…
  continue reading
 
System Design Deep Dive: Leader Election Algorithms You Should Know https://knowledge.businesscompassllc.com/system-design-deep-dive-leader-election-algorithms-you-should-know/ Ever had your entire system crash because nobody could figure out who’s in charge? Distributed systems engineers know this particular flavor of pain all too well — one minut…
  continue reading
 
Mastering WebSockets: How It Compares to Polling for Scalable System Design https://knowledge.businesscompassllc.com/mastering-websockets-how-it-compares-to-polling-for-scalable-system-design/ Ever sat watching that spinning wheel as your app tries to update, wondering if your server fell asleep? You’re not alone. Developers everywhere are caught i…
  continue reading
 
Luca Palmieri, author of Zero to Production in Rust and Principal Engineering Consultant at MainMatter, speaks with SE Radio host Gavin Henry about Rust in production. They discuss what production Rust means, how to get Rust code into production, specific Rust issues to think about when getting an application into production, what Rust profiles are…
  continue reading
 
Congressman Andy Biggs from Arizona shares his insights on the current political climate, the unrest in America, and the support for President Trump's policies. He discusses the disconnect between the Democrats and Middle America, the implications of recent protests, and the importance of law and order. Congressman Marlin Stutzman discusses the imp…
  continue reading
 
Most organizations approach ransomware as a technical problem, but Steve Baer, Field CISO at Digital Asset Redemption, has built his career understanding it as fundamentally human. His team's approach highlights why traditional cybersecurity tools fall short against motivated human adversaries and how proactive intelligence gathering can prevent in…
  continue reading
 
Send us a text Security professionals face a constant battle to keep up with evolving threats, and our latest CISSP Question Thursday podcast delivers critical insights into one of the most fundamental cybersecurity capabilities: effective logging and monitoring. The episode begins with a warning about a sophisticated attack campaign targeting recr…
  continue reading
 
TanStack is an open-source collection of high-performance libraries for JavaScript and TypeScript applications, primarily focused on state management, data fetching, and table utilities. It includes popular libraries like TanStack Query, TanStack Table, and TanStack Router. These libraries emphasize declarative APIs, optimized performance, and deve…
  continue reading
 
How to Design a Chat Application: Step-by-Step System Design Guide https://knowledge.businesscompassllc.com/how-to-design-a-chat-application-step-by-step-system-design-guide/ Ever sat in a technical interview where they asked you to design a chat app, and your mind went completely blank? Yeah, that’s the moment when all those hours of coding someho…
  continue reading
 
System Design Deep Dive: The Architecture Behind Twitter's Scale https://knowledge.businesscompassllc.com/system-design-deep-dive-the-architecture-behind-twitters-scale/ Ever wondered how Twitter processes 500 million tweets every day without crumbling? That’s roughly 5,800 tweets per second, and somehow your feed still loads in milliseconds. Behin…
  continue reading
 
Master HTTPS and Security Principles for Scalable System Design https://knowledge.businesscompassllc.com/master-https-and-security-principles-for-scalable-system-design/ Ever tapped “submit” on a payment form and then wondered if hackers were watching? You’re not alone. Software engineers everywhere face the same gut-punch anxiety about protecting …
  continue reading
 
Mastering MapReduce: The Key to Cracking System Design Questions https://knowledge.businesscompassllc.com/mastering-mapreduce-the-key-to-cracking-system-design-questions/ Ever bombed a system design interview because you couldn’t explain how to process 10TB of data? You’re not alone. I’ve watched brilliant engineers crumble when asked to scale beyo…
  continue reading
 
What Powers ChatGPT? A Peek into OpenAI’s Language Model Magic https://knowledge.businesscompassllc.com/what-powers-chatgpt-a-peek-into-openais-language-model-magic/ Remember that time you asked ChatGPT a question and it responded like it was reading your mind? Or maybe it left you scratching your head instead. Either way, you’ve probably wondered:…
  continue reading
 
Designing for Scale: Understanding the Scale Cube in Microservices Architecture https://knowledge.businesscompassllc.com/designing-for-scale-understanding-the-scale-cube-in-microservices-architecture/ Remember when you were debugging that 2 AM production issue, and your microservices architecture that seemed so elegant in the whiteboard session was…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play