EAS-MAG.digital ist eines der führenden deutschprachigen Online-Magazine für Unternehmenssoftware (ERP, CRM, Warenwirtschaft & Co.)
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A set of AI courses and news items from AI development agency SevenLab.dev
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
xx
…
continue reading
For Bobby
…
continue reading
Linear and Quadratic Applications
…
continue reading
CGM application step by step
…
continue reading

1
The Smart Economy Podcast: Real-World Blockchain Applications with Crypto, DeFi, NFTs, and DAOs
Ragnarok Digital, LLP
The Smart Economy Podcast features interviews with some of the most interesting people within the blockchain industry, working to make the new smart economy a reality.
…
continue reading
We discuss application of Missiles and Rockets for peaceful purposes.
…
continue reading
Discovering HeLa Cells and an interview with myself.
…
continue reading
Welcome to the Applications of Psychology podcast, where amazing things happen.This podcast discusses how social media can be helpful to us and to our future based on psychology.
…
continue reading
Listen up to hear about my interview with 5th grade teacher Mrs. Derouen! Cover art photo provided by Jeremy Galliani on Unsplash: https://unsplash.com/@jeremyforlife
…
continue reading
…
continue reading
…
continue reading
The Truth, The Whole Truth & Nothing But The Truth About Criminal Appeal Applications In The UK
…
continue reading
In this podcast, I talk about my interests in different companies and share how I can succeed in an open role at said company.
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
Nba 2k audio application
…
continue reading
Auditform by Formability provide cloud data acquisition and management apps for all types of organisations.
…
continue reading

1
CSE 135 - Server-side Web Applications - LE [A00] [Screencast] - Prof. Papakonstantinou, Yannis [SP15]
Papakonstantinou, Yannis
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
We are specialized in archiving legacy systems within applications decommissioning. In doing so, we have successfully implemented with hundreds of companies from a wide range of industries worldwide.
…
continue reading
It's Time is the Bible-teaching radio ministry of Mike Kestler, pastor of The River Christian Fellowship in Twin Falls, Idaho, home of CSN International.
…
continue reading
Welcome to Modern Digital Applications - a podcast for corporate decision makers and executives looking to create or extend their digital business with the help of modern applications, processes, and software strategy. Your host is Lee Atchison, a recognized industry thought leader in cloud computing and published author bringing over 30 years of experience.
…
continue reading
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
…
continue reading
Want to learn more about how to be admitted to a great university? Succeed in and after college? Or are you a parent who wants to learn more about higher education? Then this is the right podcast for you!
…
continue reading
This is IJM HUB Game hub application by Ivan Odongo. This application is envisioned to simply various games predominantly played offline to online. This podcast describes how the game has a potential to improve lives of youths in Uganda and all over the world. It’s an idea yet to be implemented. Ivan welcomes potential investors to be part of this amazing project.
…
continue reading
Welcome to "Reviews on Software Applications," the podcast where we review and discuss the latest software applications. Each episode, we explore new and popular apps, looking at their features, design, and how well they work. Whether you're a developer, tech fan, or just someone who loves trying out new apps, our honest reviews and insights will help you stay informed. Join us as we break down what makes these apps great, share our thoughts, and keep you up-to-date in the digital world.
…
continue reading
Consists of highly motivated and proactive civilians looking to learn, train and purchase retail from trusted veteran owned businesses. Our members are dedicated to self reliance and self defense as well as creating their own network of likeminded law abiding citizens for mutual support during times of crisis.
…
continue reading
Podcast by Nicole and Adli
…
continue reading
APPLICATION SOFTWARE USED IN MASS COMMUNICATION LECTURE III JUNE 3
…
continue reading

1
Application: The TYPO3 Community Podcast
Jeffrey A. "jam" McGuire, Open Strategy Partners, TYPO3 Association
Jeffrey A. McGuire celebrates the TYPO3 community by sharing your stories, your projects, and the difference you make. Application is a narrative journey connecting developers, marketers, consultants, integrators, designers, and end-users with Jeffery’s signature conversational style. Meet the humans behind the technology.
…
continue reading
A Columbia University undergrad and his old teacher talk about college admissions: how students can craft the best college application, how teachers and administrators can help them, and how colleges can improve the system.
…
continue reading
Our mission is to build a technology-enabled community to improve the health and wellness of medical patients and user alike, through data optimization of medical cannabis research and production. Our Citizen Green platform is the world’s first medical cannabis network that builds a cross-industries knowledge base which drives confidence in cannabis products, enhances prescription efficacy, and improves the lives of patients around the world.
…
continue reading
Talking about the resiliency mindset and how its used in real-world applications. Original music composed by Tyson Collier.
…
continue reading
Listen to software how-to's, information on next generation gaming consoles, the latest in gadgets and tech news.
…
continue reading
For practicing acupuncturists, each episode in this weekly podcast explores needling technique, indications, and clinical applications for a set of five individual acupuncture points. Over 300 points are discussed in detail. The conversation is based on the personal experiences of two seasoned practitioners, each with over 30 years of clinical practice. For acupuncture continuing education credits, view these classes online at https://acupunctureceuonline.com Dr. Daoshing Ni is the co-founde ...
…
continue reading

1
Heights and Distances (Part 1) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
RIApodcast - we discuss the latest news and topics in Rich Internet Applications and Technologies
John Mason
A technology podcast focusing on Rich Internet Technologies such as ColdFusion, Flex, Flash, jQuery and AIR.
…
continue reading

1
Alan Wallace Fall 2012 Retreat Podcast: Vipashyana, Four Applications of Mindfulness
B. Alan Wallace
Teachings from the eight-week retreat at Thanyapura Mind Centre, Phuket, Thailand
…
continue reading

1
Similar to triangle (Part 2) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
Heights and Distances (Part 2) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
Skype Hangs Up, Android Backdoors, Jailbreak Research, Pretend AirTags, Wallbleed - ASW #321
33:17
33:17
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:17Skype hangs up for good, over a million cheap Android devices may be backdoored, parallels between jailbreak research and XSS, impersonating AirTags, network reconnaissance via a memory disclosure vuln in the GFW, and more! Show Notes: https://securityweekly.com/asw-321
…
continue reading

1
Augmented RAG with n8n | Mar 5, 2025
24:14
24:14
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:14Keywords AI, business, document management, retrieval augmented generation, proof of concept, facility management, asylum seekers, technology, innovation, data processing Summary In this podcast episode, Bas Alderding and Koen Ter Velde discuss the practical applications of AI in business, specifically focusing on a proof of concept (POC) they deve…
…
continue reading

1
Jim Routh -- The CISO Transition to the rest of life
49:36
49:36
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
49:36Former CISO Jim Routh discusses his perspective on retirement and career fulfillment in cybersecurity. Rather than viewing retirement as simply stopping work, Routh describes his three-filter approach: working only with people he respects and admires, doing only work he finds fulfilling, and controlling when he works. He shares valuable lessons lea…
…
continue reading

1
CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321
1:13:50
1:13:50
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:13:50Just three months into 2025 and we already have several hundred CVEs for XSS and SQL injection. Appsec has known about these vulns since the late 90s. Common defenses have been known since the early 2000s. Jack Cable talks about CISA's Secure by Design principles and how they're trying to refocus businesses on addressing vuln classes and prioritizi…
…
continue reading
Mit dem Aufkommen der Remote-Arbeit hat für viele Mitarbeiter die Anzahl von Video-Meetings sprunghaft zugenommen. Eine Folge davon ist die sogenannte „Meeting-Fatigue“. Sie drückt sich in Erschöpfung und Müdigkeit aus, begleitet von Ungeduld und Konzentrationsproblemen. Derweil sorgt künstliche Intelligenz (KI) während Meeting-Marathons für mehr E…
…
continue reading

1
SevenLab AI project canvas | Mar 11, 2025
33:03
33:03
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:03Keywords AI implementation, project canvas, data requirements, skills, metrics, governance, integration, stakeholders, cost analysis, project timeline Summary In this conversation, Bas Alderding and Koen Ter Velde discuss the importance of proper planning in AI implementation, introducing the AI Project Canvas as a structured approach to navigate t…
…
continue reading

1
CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321
40:34
40:34
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
40:34Just three months into 2025 and we already have several hundred CVEs for XSS and SQL injection. Appsec has known about these vulns since the late 90s. Common defenses have been known since the early 2000s. Jack Cable talks about CISA's Secure by Design principles and how they're trying to refocus businesses on addressing vuln classes and prioritizi…
…
continue reading

1
QR Codes Replacing SMS, MS Pulls VSCode Extension, Threat Modeling, Bybit Hack - ASW #320
33:55
33:55
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:55Google replacing SMS with QR codes for authentication, MS pulls a VSCode extension due to red flags, threat modeling with TRAIL, threat modeling the Bybit hack, malicious models and malicious AMIs, and more! Show Notes: https://securityweekly.com/asw-320
…
continue reading

1
Henrik Plate -- OWASP Top 10 Open Source Risks
38:26
38:26
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
38:26Henrik Plate joins us to discuss the OWASP Top 10 Open Source Risks, a guide highlighting critical security and operational challenges in using open source dependencies. The list includes risks like known vulnerabilities, compromised legitimate packages, name confusion attacks, and unmaintained software, providing developers and organizations a fra…
…
continue reading

1
Keeping Curl Successful and Secure Over the Decades - Daniel Stenberg - ASW #320
35:08
35:08
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:08Curl and libcurl are everywhere. Not only has the project maintained success for almost three decades now, but it's done that while being written in C. Daniel Stenberg talks about the challenges in dealing with appsec, the design philosophies that keep it secure, and fostering a community to create one of the most recognizable open source projects …
…
continue reading

1
Keeping Curl Successful and Secure Over the Decades - Daniel Stenberg - ASW #320
1:09:02
1:09:02
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:09:02Curl and libcurl are everywhere. Not only has the project maintained success for almost three decades now, but it's done that while being written in C. Daniel Stenberg talks about the challenges in dealing with appsec, the design philosophies that keep it secure, and fostering a community to create one of the most recognizable open source projects …
…
continue reading
Im Qualitätsmanagement sind „Non-Conformance Reports“ (NCR) oder Nichtkonformitätsberichte wertvoll, um aus Fehlern zu lernen, diese proaktiv zu verhindern und das Unternehmen dem Ziel der „Predictive Quality“ näherzubringen. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digital/5-tipps-zu-non-conformance-reports-mit-ki/…
…
continue reading
Generative KI verbraucht Strom, sogar sehr viel Strom. Vor allem das Training der großen Sprachmodelle erfordert aufgrund der benötigten Rechenleistung eine enorme Menge an Energie. Dell Technologies nennt wichtige Maßnahmen, um den Verbrauch und die Umweltauswirkungen zu reduzieren. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digi…
…
continue reading

1
Innovationsmotor RPA – Mit diesen vier Tipps bringen Unternehmen ihren Customer Service auf Touren
6:13
Effizientere Prozesse, zufriedenere Kunden und Mitarbeiter. Diese Potenziale haben Software-Roboter im Kundendienst. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/innovationsmotor-rpa-mit-diesen-vier-tipps-bringen-unternehmen-ihren-customer-service-auf-touren-2/EAS-MAG.digital
…
continue reading
Der Kunde ist König, doch ein König kann zum Tyrannen werden. Beispiele dafür gibt es auch aus der virtuellen Welt. Drei Tage Lieferzeit werden klar kommuniziert und der Kunde startet bereits nach einem Tag ein Sperrfeuer an E-Mails. Eine Bewertung fällt negativ aus, obwohl der Online-Shop sämtliche Zusagen eingehalten hat. Eine E-Mail wird nicht b…
…
continue reading

1
From NFTs to Regulatory Clarity: Magic Eden's Vision for Web3's Future with Joe Doll
55:36
55:36
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
55:36In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Joe Doll, general counsel at Magic Eden, a leading cross-chain NFT marketplace. Join them as they discuss: The transformative impact of the new administration's pro-crypto executive order How stablecoins could cement U.S. dollar dominance Magic Eden's journey to becomin…
…
continue reading

1
Tanya Janca -- A Secure SDLC from a Developer's Perspective
48:54
48:54
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
48:54Security expert Tanya Janca discusses her new book "Alice and Bob Learn Secure Coding" and shares insights on making security accessible to developers. In this engaging conversation, she explores how security professionals can better connect with developers through threat modeling, maintaining empathy, and creating inclusive learning environments. …
…
continue reading

1
Regex DoS, LLM Backdoors, Secure AI Architectures, Rust Survey - ASW #319
36:26
36:26
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
36:26Applying forgivable vs. unforgivable criteria to reDoS vulns, what backdoors in LLMs mean for trust in building software, considering some secure AI architectures to minimize prompt injection impact, developer reactions to Rust, and more! Show Notes: https://securityweekly.com/asw-319
…
continue reading

1
Developer Environments, Developer Experience, and Security - Dan Moore - ASW #319
33:56
33:56
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
33:56Minimizing latency, increasing performance, and reducing compile times are just a part of what makes a development environment better. Throw in useful tests and some useful security tools and you have an even better environment. Dan Moore talks about what motivates some developers to prefer a "local first" approach as we walk through what all of th…
…
continue reading

1
Developer Environments, Developer Experience, and Security - Dan Moore - ASW #319
1:10:21
1:10:21
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:10:21Minimizing latency, increasing performance, and reducing compile times are just a part of what makes a development environment better. Throw in useful tests and some useful security tools and you have an even better environment. Dan Moore talks about what motivates some developers to prefer a "local first" approach as we walk through what all of th…
…
continue reading

1
Reasoning models, deep research and 2025 news
24:03
24:03
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:03Keywords AI, reasoning models, deep research, business applications, AI developments, OpenAI, DeepSeek, market research, automation, technology Summary In this podcast episode, Bas Alderding and Koen Ter Velde discuss the latest advancements in AI, focusing on reasoning models and deep research tools. They explore how these technologies are evolvin…
…
continue reading

1
Top 10 Web Hacking Techniques of 2024 - James Kettle - ASW #318
44:57
44:57
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
44:57We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after ye…
…
continue reading

1
Top 10 Web Hacking Techniques of 2024 - James Kettle - ASW #318
44:57
44:57
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
44:57We're getting close to two full decades of celebrating web hacking techniques. James Kettle shares which was his favorite, why the list is important to the web hacking community, and what inspires the kind of research that makes it onto the list. We discuss why we keep seeing eternal flaws like XSS and SQL injection making these lists year after ye…
…
continue reading
Ohne Daten keine KI – so einfach lässt sich die Erfahrung beschreiben, die viele Unternehmen derzeit machen. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digital/daten-sammeln-und-zwar-ab-sofort/EAS-MAG.digital
…
continue reading
Wie die Digitale Transformation die Rolle der IT in Unternehmen verändert. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digital/der-cio-auf-dem-weg-zum-strategischen-berater/EAS-MAG.digital
…
continue reading

1
From TradFi to DeFi: Building the Future of Real World Assets with Centrifuge's Eli Cohen
54:22
54:22
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
54:22In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Eli Cohen, general counsel at Centrifuge, a platform for tokenized real-world assets. Join them as they discuss: The evolution from traditional finance to tokenized assets How T-Bills are being brought on-chain Building regulatory-compliant RWA infrastructure Designing …
…
continue reading

1
Mehran Koushkebaghi -- Security as a Systemic Concern: How to develop Anti-Requirements
45:08
45:08
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
45:08Mehran Koushkebaghi, a seasoned engineering expert, delves into the intricacies of systemic security. He draws parallels between civil engineering and IT systems, and explains the importance of holistic thinking in security design. Discover the difference between semantic and syntactic vulnerabilities and understand how anti-requirements play a cri…
…
continue reading

1
Unforgivable Vulns, DeepSeek iOS App Security Flaws, Memory Safety Standards - ASW #317
35:52
35:52
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
35:52Identifying and eradicating unforgivable vulns, an unforgivable flaw (and a few others) in DeepSeek's iOS app, academics and industry looking to standardize principles and practices for memory safety, and more! Show Notes: https://securityweekly.com/asw-317
…
continue reading

1
Code Scanning That Works With Your Code - Scott Norberg - ASW #317
1:12:52
1:12:52
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
1:12:52Code scanning is one of the oldest appsec practices. In many cases, simple grep patterns and some fancy regular expressions are enough to find many of the obvious software mistakes. Scott Norberg shares his experience with encountering code scanners that didn't find the .NET vuln classes he needed to find and why that led him to creating a scanner …
…
continue reading

1
Code Scanning That Works With Your Code - Scott Norberg - ASW #317
37:01
37:01
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
37:01Code scanning is one of the oldest appsec practices. In many cases, simple grep patterns and some fancy regular expressions are enough to find many of the obvious software mistakes. Scott Norberg shares his experience with encountering code scanners that didn't find the .NET vuln classes he needed to find and why that led him to creating a scanner …
…
continue reading