CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Custom Posts - Blip - Blip
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
ProCurve Networking - NPI Sales Training
…
continue reading
Welcome to "5G6G Pulse", your ultimate source for everything related to the groundbreaking world of 5G technology. Hosted by Modi Daryani, this podcast delves into the latest advancements, trends, and innovations in 5G, exploring its transformative impact across various industries and everyday life. Each episode of "5G6G Pulse" features in-depth discussions on key topics such as the evolution of mobile networks, the integration of 5G with AI and IoT, the revolutionary potential of autonomous ...
…
continue reading
We are excited to share our first podcast which is about our company "VMukti Solutions Pvt. Ltd". Our company is a global exporter of innovative solutions, Proven Technology, and Hybrid Solutions for Smart Cities, Healthcare, Education, Vehicle Surveillance, Warehouse surveillance, Election surveillance, Bank surveillance, Examination surveillance, and many more. Our varieties of CCTV camera includes, - WIFI camera: Which is Suitable for Indoor and Outdoor location - 4G Camera: Specially des ...
…
continue reading
Join us as we chat with experts from inside and outside Cisco Meraki. Hear about the latest in technology and the people and culture that drive the business. We’d love to hear your feedback—share it with us at community.meraki.com.
…
continue reading
Brought to you by Hughes, a leader in digital business solutions like digital signage and wireless connectivity.
…
continue reading
A daily news program covering the top stories in technology with a weekend in depth interview.
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
This is a feed of pages for iversen1449963
…
continue reading
Techz plaza is an american company primarily shipping worldwide customer committed to delivering Innovation and convenience to its customer.
…
continue reading
We cover the latest in cybersecurity news, including what new threats are out there and what you can do to protect yourself and your clients.
…
continue reading
Welcome to the ISU ECpE podcast, from the Iowa State University Department of Electrical and Computer Engineering (ECpE). Here in ECpE, The Future Is What We Do!
…
continue reading
The Signal, a Wi-Fi Alliance® podcast, delivers a new perspective on the growing portfolio of Wi-Fi technologies by breaking down the new tools, programs, and capabilities that are changing the connectivity landscape.
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
A podcast for security professionals, provided by the Total Security Daily Advisor.
…
continue reading
Take a narrative walk along the education IT journey of fascinating ideas, innovative approaches to trends & challenges and tangible takeaways with Greg Kovich, Global Sales Director for Education at Alcatel-Lucent Enterprise, Don Otto, Director of Network Services for Ridley School District, and their industry-leading guests.
…
continue reading
Bite-sized podcast designed for quick consumption. Each episode clocks in under 10 minutes and helps to educate listeners on gadgets, apps, games, and more. An informal and informative approach to cool tech and things we think you'd like, we highlight our favorite things to cross our path. We also like to chat about other non-tech things that we believe you'd love.
…
continue reading

1
The Inflection Point: AI's Gentle Singularity and the Security Conundrum
58:57
58:57
Play later
Play later
Lists
Like
Liked
58:57In this episode of Hashtag Trending, titled 'The Inflection Point: AI's Gentle Singularity and the Security Conundrum', the hosts grapple with planning their show amidst rapid technological changes and delve into a blog post by Sam Altman on the 'Gentle Singularity.' The discussion touches on concepts from astrophysics and AI, explaining the singul…
…
continue reading

1
AI Outages, Wikipedia's AI Summary Halt, 23andMe Data Deletion, and Google Gemini's Spreadsheet Revolution
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11In this episode of #Trending, hosted by Dr. Hamma sitting in for Jim Love, we explore the longest ChatGPT outage ever, which lasted over 12 hours and exposed our growing dependency on AI. We also discuss Wikipedia's paused AI summary experiment due to negative feedback from editors, and the growing privacy concerns as nearly 15% of 23andMe customer…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
…
continue reading

1
AI Talent Wars, Affordable 3D Printed Robots, and Local GPT-4 Intelligence
16:06
16:06
Play later
Play later
Lists
Like
Liked
16:06Meta struggles to retain AI talent despite offering substantial salaries, losing experts to companies like OpenAI and Anthropic, which leads with a unique, flexible work culture. Meanwhile, breakthroughs in 3D printing are democratizing robot creation, allowing beginners to build robots for just $500. DeepSeek's GPT-4 level reasoning model can now …
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
…
continue reading

1
Nordic PMICs – Integrated, Flexible, and Easy-to-Use
25:21
25:21
Play later
Play later
Lists
Like
Liked
25:21Today, it is a pleasure to have a special guest, Geir Kjosavik, joining us to discuss precisely why Nordic Semiconductor, a fabless semiconductor company that has a long track record and legacy in designing ultra-low-power wireless solutions, made the move towards power management ICs, or PMICs. The increasing popularity of battery-operated devices…
…
continue reading

1
Quantum Leap: IBM's Quantum Starling, AI's Impact on Jobs, and Denmark's Digital Independence
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28This episode of Hashtag Trending, hosted by Jim Love, covers IBM's plan to deliver the world's first fault-tolerant quantum computer by 2029, significantly advancing quantum computing capabilities. It also discusses Robert F. Smith's stark warning about AI's transformative impact on jobs in the finance sector and beyond. Additionally, the episode e…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
…
continue reading

1
PP066: News Roundup – NIST’s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
…
continue reading
A validation survey is typically used for wireless infrastructure post-installation. It compares predictions to real wireless network performance. On today’s show we chat with Joel Crane about validation survey controversies and the challenges of producing a survey whose data has integrity. We cover topics such as the perfectly green heat map, how …
…
continue reading

1
Meta's $10 Billion Bet on AI, Microsoft's USB-C Overhaul, and AI Diplomacy Experiments
15:26
15:26
Play later
Play later
Lists
Like
Liked
15:26In this episode of Hashtag Trending, host Jim Love discusses Meta's potential $10 billion investment in Scale AI, a data annotation company. The investment aims to bolster Meta's AI initiatives and improve training data quality for AI models. Despite controversy over labor practices, Scale AI's revenue is growing rapidly, and it has strong ties wit…
…
continue reading

1
SANS Stormcast June, Tuesday, June 10th, 2025: Octosql; Mirai vs. Wazuh DNS4EU; Wordpress Fair Package Manager
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
…
continue reading

1
Musk's Empire Under Siege: Political Feuds, AI Rivalries, and Aviation Modernization
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32In this episode of Hashtag Trending, host Jim Love delves into the tumultuous landscape facing Elon Musk and his companies. Musk's public feud with President Trump has led to a massive 14.3% drop in Tesla's stock, wiping out approximately $152 billion in market value. The fallout extends to regulatory challenges and competition from traditional aut…
…
continue reading

1
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
…
continue reading

1
NC #1048 Sindre Sorhus Apps on SCO, Maggie Vision, Recording Remote Incident Manager, VPNs Explained in Security Bits
1:39:16
1:39:16
Play later
Play later
Lists
Like
Liked
1:39:16South Bay Mac Users Group Naples Mac User Group Perkins School for the Blind Sindre Sorhus Apps Dato, Aiko and Velja on ScreenCastsONLINE CSUN 2025: Maggie Vision iVR Headset for People with Low Vision Challenging Recording of the Remote Incident Manager for Macstock Support the Show Security Bits — 8 June 2025 — Including VPN Deep Dive Transcript …
…
continue reading

1
How 6G + Satellites Will Bring High-Speed Internet to the Last Mile?
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00S2: Episode: 6 In this episode of 5G6G Pulse, we’re taking you on a fascinating journey - from those old rooftop antennas and grainy TV signals during monsoon… all the way to the cutting-edge world of 6G-powered satellite communication. We’ll start by unpacking the vital role LEO (Low Earth Orbit) satellites already play in our lives - from powerin…
…
continue reading

1
AI Integration Explored: ChatGPT vs. Google Gemini and the Future of Personal Identity
1:06:50
1:06:50
Play later
Play later
Lists
Like
Liked
1:06:50In this episode of Project Synapse, Jim and Marcel navigate a rapidly evolving AI landscape while John appears intermittently through AI-generated clips, with his permission. They delve into intriguing developments at Google Labs, including a mysterious AI model that briefly appeared and vanished. The discussion highlights the differing ambitions o…
…
continue reading

1
Samsung's AI Shift, Fake Hard Drives Exposed, ChatGPT's Big Update, Amazon's Robot Deliveries
12:02
12:02
Play later
Play later
Lists
Like
Liked
12:02In this episode, Dr. Heyman explores several major stories in tech, including Samsung's potential switch from Google's Gemini to Perplexity AI for its Galaxy S26, a gamer's discovery of a counterfeit external hard drive scam, OpenAI's new feature allowing ChatGPT to search user files, and Amazon's humanoid robots poised to revolutionize package del…
…
continue reading

1
SANS Stormcast Friday, June 6th, 2025: Fake Zoom Clients; Python tarfile vulnerability; HPE Insight Remote Support Patch
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
…
continue reading

1
Blueprint for an AI Future: OpenAI Chief Economist on How AI Will Shape the Global Economy
52:18
52:18
Play later
Play later
Lists
Like
Liked
52:18Will AI displace more jobs than it creates? How can the U.S. win the AI race? How can AI benefits be evenly distributed across businesses and society? We explore these questions and more as Sriram Viswanathan sits down with Ronnie Chatterji, Chief Economist at OpenAI, for an in-depth exploration of AI's economic impact and policy implications. Ronn…
…
continue reading

1
Ukraine Takes Out 1/3 of Russian Air Fleet With Open Source Toy Plane Controller, Quantum Internet Breakthrough, and Germany's Digital Sovereignty Push
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In this episode of Hashtag Trending, host Jim Love covers three captivating stories. The first one details Ukraine's daring operation using 20-year-old open source gaming software, ArduPilot, to destroy a third of Russia's strategic bomber fleet. The attack involved 117 drones launched across five Russian air bases, highlighting the unprecedented u…
…
continue reading

1
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
…
continue reading

1
Meta’s Military Metaverse, Apple's Wireless Future, Broadcom's VMware Shake-Up, and Shopify's Legal Victory
12:48
12:48
Play later
Play later
Lists
Like
Liked
12:48In this episode of Trending, host Jim Love discusses several major tech stories. Meta has found a new application for its Metaverse technology through a partnership with defense contractor Andural Industries to develop AI-powered, augmented reality combat helmets for the U.S. military. Apple is rumored to be making its upcoming iPhone 17 Air the fi…
…
continue reading

1
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
…
continue reading
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
…
continue reading

1
NVIDIA Criticizes US Export Controls and Getty Battles AI Copyright Infringement
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21In this episode of Hashtag Trending, host Jim Love discusses NVIDIA CEO Jensen Huang's criticism of US export controls on AI chips that have led to significant financial losses for his company while bolstering Chinese AI competitors like Huawei. NVIDIA faces an $8 billion revenue loss due to restricted H20 chip exports to China. Huang argues that t…
…
continue reading

1
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
…
continue reading

1
SANS Stormcast Monday, June 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
…
continue reading

1
Deep Fakes Just Got Harder To Identify, Quantum Leadership in Canada's Startups and Running AI On Your Smart Phone
9:42
9:42
Play later
Play later
Lists
Like
Liked
9:42If you'd like to support us with a small donation, go to buymeacoffee.com/techpodcast Deep fakes evolve, and AI detection now struggles to keep up! This video explores the alarming advancements in deep fake technology that allow synthetic videos to mimic even biological signals like heartbeats, making traditional detection tools less effective. Dis…
…
continue reading

1
NC #1047 Elbow for Presentations, Jamworks Accessible Notetaking, Feature Parity Apple Photos, Case for Vison, Adam Engst on Deep Linking and VPN Survey
1:44:50
1:44:50
Play later
Play later
Lists
Like
Liked
1:44:50Allison on Double Tap Talking CSUN Using My Elbow to Do a Presentation Over Zoom CSUN 2025: Jamworks AI Notetaking App for Students I Want Feature Parity in Apple Photos Between macOS and iPadOS CSUN 2025: Case For Vision Assistive Devices for People with Vision Loss Support the Show CCATP #814 — Adam Engst on Deep Linking and VPN Survey Transcript…
…
continue reading

1
The White Collar Blood Bath - Dario Amodei Issues a Stark Warning
55:31
55:31
Play later
Play later
Lists
Like
Liked
55:31AI, Automation, and the Future of Jobs: A Critical Discussion JOIN OUR DISCORD CHANNEL https://discord.gg/4uwxk6TN6r Support us at: buymeacoffee.com/techpodcast In this episode of Project Synapse's Friday morning coffee chat, the team dives deep into the impact of AI on the job market, sparked by Dario Amodei's candid warning about impending job lo…
…
continue reading

1
Doomsday Bunker for AI, Apple's iOS 26, and Trump's Tech War
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24In this episode of Hashtag Trending, Jim Love discusses several major tech and geopolitical developments. OpenAI co-founder Ilya Sutskever's controversial proposal for a doomsday bunker before achieving artificial general intelligence (AGI) highlights internal conflicts over AI safety. Apple announces a leap from iOS 18 to iOS 26, aligning software…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading

1
The Impending Office Job Disruption by AI and Google's Antitrust Challenges
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47In this episode of Hashtag Trending, Jim Love discusses several major tech industry stories. Anthropics CEO Dario Amodei warns that AI could potentially replace large numbers of office jobs within the next few years, potentially leading to high unemployment rates. He emphasizes the need for more awareness and discussion on this pressing issue. Goog…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading
Ubiquiti is known primarily for wireless equipment for residential and small business use, but it can be a player in the enterprise world. On today’s show, we talk with Darrell DeRosia, Sr. Director, Network & Infrastructure Services with the Memphis Grizzlies, about how he provides that connectivity for the FedExForum, home to the Memphis Grizzlie…
…
continue reading

1
Claude Opus 4 Dominates AI Coding, TELUS Invests Big in AI, Meta's Workforce Optimizations, and SpaceX's Solar Woes
13:27
13:27
Play later
Play later
Lists
Like
Liked
13:27Claude Opus 4 Dominates AI Coding, TELUS Invests Big in AI, Meta's Workforce Optimizations, and SpaceX's Solar Woes In this episode, Jim Love discusses how Claude Opus 4.0 is rapidly becoming the preferred AI tool among software developers, outperforming competitors in handling complex coding tasks. Canada's TELUS announces a substantial $70 billio…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
…
continue reading

1
China's GR-1 Robot, Anthropic's AI Ethics Test, and Quantum Computing Breakthrough
10:21
10:21
Play later
Play later
Lists
Like
Liked
10:21In this episode of Hashtag Trending, host Jim Love discusses China's new $20,000 GR-1 humanoid robot aimed at home use and how it competes with US offerings like Tesla's Optimus. He also covers Anthropic's latest AI model, Claude Opus 4, which showcased manipulative behaviors during a self-preservation test, highlighting the importance of rigorous …
…
continue reading
Ever wondered how we can stay ahead of cyber threats without burning out? On this edition of Explain IT, we're talking about the leveraging of advanced technology to automatically detect, investigate, and respond to cyber threats, reducing the need for constant human intervention that could lead to burnout. It's all about enhancing efficiency, spee…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
AI's Billion-Dollar Future, Europe Looks For Sovereign Cloud and X Outage
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04In this episode of Hashtag Trending, guest host Dr. Hema Murti explores the latest in tech predictions and developments, filling in for Jim Love. Dario Amodei from Anthropic predicts the rise of billion-dollar solopreneur businesses by 2026, driven by AI capabilities in areas like writing, coding, and customer support. The episode also covers recen…
…
continue reading

1
NC #1046 Be My Eyes at CSUN, WWDC 2024 Wishlist, Dolphin for the Visually Impaired, SD Card Speeds by Allister Jenks, Security Bits
1:30:15
1:30:15
Play later
Play later
Lists
Like
Liked
1:30:15PBS 180: Theming Jekyll (GitHub Pages) CSUN 2025: Be My Eyes Connects Visually Impaired with Sighted Volunteers What I Wanted from WWDC in 2024 CSUN 2025: Dolphin Computer Access for Visually Impaired SD Card Speeds — How Fast Are They Really? Support the Show Security Bits — 25 May 2025 Transcript of NC_2025_05_25 Join the Conversation: allison@po…
…
continue reading

1
How Should Modern Medical Care Look Like in the Era of Telco + AI?
25:00
25:00
Play later
Play later
Lists
Like
Liked
25:00S2: Episode: 5 In this deeply personal and forward-looking episode, I reflect on what I observed during a tough 5-month medical journey - and raise one crucial question: Can AI and telecom revolutionize healthcare the way smartphones changed communication? From unnecessary tests and robotic routines to a lack of personalized care, our healthcare sy…
…
continue reading

1
AI in the Spotlight: Google IO, OpenAI's Ambitions, and the Future of Work - Project Synapse
1:07:39
1:07:39
Play later
Play later
Lists
Like
Liked
1:07:39JOIN OUR DISCORD CHANNEL https://discord.gg/4uwxk6TN6r Support us at: buymeacoffee.com/techpodcast In this episode of Project Synapse on Hashtag Trending, Jim Love, Marcel Gagne, and John Pinard dive into a week full of remarkable AI advancements and their implications for the job market and future technologies. The discussion kicks off with the ma…
…
continue reading

1
Zuckerberg's Metaverse Gamble, Volvo's AI Integration, and KeePass Security Threat
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31Mark Zuckerberg continues to invest heavily in the Metaverse, despite setbacks and a competitive AI landscape. Meta's ambitious goals involve significant capital expenditures and advancements in both hardware and software, although widespread VR adoption remains challenging. Meanwhile, Volvo partners with Google to introduce Gemini AI into its vehi…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
Inside Nokia’s Strategy: CSTO Nishant Batra on Telecom’s Future, Brand Reinvention, and Betting on Bell Labs
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31In this episode of TechSurge, host Sriram Viswanathan sits down with Nishant Batra, Chief Strategy and Technology Officer at Nokia, for a deep dive into the evolving landscape of telecom and wireless technology. Nishant shares insights into the seismic shifts transforming network infrastructure—from core networks to edge computing—and discusses how…
…
continue reading