Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
next generation web podcast
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Exploring the observability side of software development.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
A podcast about web design and development.
…
continue reading
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Kendra Little's podcast discussing database performance tuning, software development, and working with data.
…
continue reading
Rubyists having conversations and interviewing others about Ruby and web development.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today's tech megatrends will impact you.
…
continue reading
Experienced Open Source professionals exploring the tech we actually use. If it runs on Linux, we're into it. Whether you're tweaking your desktop, gaming, self-hosting, developing software, improving terminal productivity, or running production infrastructure — we cover the tools and workflows that actually matter. New episode every fortnight. Upbeat and family-friendly for Linux enthusiasts of all ages.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Audio podcasts on software testing.
…
continue reading
Programming is a podcast that aims to make us better software engineers! With each episode, you'll learn about a computer science concept in a brief and accessible way.
…
continue reading
Cascading Style Sheets (CSS) is the web's core styling language. For web developers, It's one of the quickest technologies to get started with, but one of the hardest to master. Follow Una Kravets and Bramus Van Damme, Developer Advocates from Google, who gleefully breakdown complex aspects of CSS into digestible episodes covering everything from accessibility to z-index.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Software developer at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑🏫 Courses I Te ...
…
continue reading
coffee => code
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Wes and Scott revisit their 2025 web development predictions, grading hits and misses across AI, browsers, frameworks, CSS, and tooling. From Temporal and AI coding agents to React, Vite, and vanilla CSS, they reflect on what actually changed, what stalled, and what it all means heading into 2026. Show Notes 00:00 Welcome to Syntax! 866: 2025 Web D…
…
continue reading
1
SE Radio 700: Mojtaba Sarooghi on Waiting Rooms for High-Traffic Events
1:07:46
1:07:46
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:07:46Mojtaba Sarooghi, a Distinguished Product Architect at Queue-it, speaks with host Jeremy Jung about virtual waiting rooms for high-traffic events such as concerts and limited-quantity product releases. They explore using a virtual queue to prevent overloading systems, how most traffic is from bots, using edge workers to reduce requests to the custo…
…
continue reading
1
State of the "log" 2025 (Friends)
1:42:24
1:42:24
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:42:24Our 8th annual year-end wrap-up is here! We’re featuring 8 listener voicemails, dope Breakmaster Cylinder remixes & our favorite episodes of the year. Thanks for listening! 💚 Join the discussion Changelog++ members save 8 minutes on this episode because they made the ads disappear. Join today! Sponsors: Depot – 10x faster builds? Yes please. Build …
…
continue reading
1
Jumpstart Pro Evolution - Streamlining Rails Development
1:05:42
1:05:42
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:05:42In this episode, Chris and David Hill catch up on wild winter temperature swings, then dive into what Chris has been refactoring in Jumpstart to reduce merge pain, cut dependencies, and make upgrades smoother. The conversation branches into AI-assisted coding pitfalls and where AI shines, new web security headers that could simplify CSRF handling, …
…
continue reading
This episode kicks off the Career Growth Accelerator series, focused on the specific hurdles faced by mid-to-senior level engineers, managers, and leaders who are looking to move to the next level. Before diving into specific strategies, I’m addressing the fundamental prerequisite for real growth: getting out of your own way. We often block our own…
…
continue reading
Episode Summary The future of cyber resilience lies at the intersection of data protection, security, and AI. In this conversation, Cohesity CEO Sanjay Poonen joins Danny Allan to explore how organisations can unlock new value by unifying these domains. Sanjay outlines Cohesity’s evolution from data protection to security in the ransomware era, to …
…
continue reading
1
#201 The "AI is going to replace devs" hype is over – 22-year developer veteran Jason Lengstorf
1:08:25
1:08:25
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:08:25Today Quincy Larson interviews Jason Lengstorf. He's a college dropout who taught himself programming while building websites for his emo band. 22 years later he's worked as a developer at IBM, Netlify, run his own dev consultancy, and he now runs CodeTV making reality TV shows for developers. We talk about: - How many CEOs over-estimated the impac…
…
continue reading
This year's DORA report focuses on AI-assisted software development. While one of the key themes is just how ubiquitous AI is today in software engineering, that's only part of the picture. In fact, the report outlines many of the challenges the adoption of these technologies are posing and explores the barriers and obstacles that need to be addres…
…
continue reading
Imagine facing a problem you can't name, something that feels bigger than any bug you've ever had to fix. How do you debug your own mind when you don't even know what's wrong? Burke Holland's story starts with a college party and a bad trip that leaves a deeper mark than he expects. Sleep gets harder. Fear creeps in. His life starts shrinking. Scho…
…
continue reading
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
…
continue reading
#330: In this short episode, Darin and Viktor reflect on the holiday season. YouTube channel: https://youtube.com/devopsparadox Review the podcast on Apple Podcasts: https://www.devopsparadox.com/review-podcast/ Slack: https://www.devopsparadox.com/slack/ Connect with us at: https://www.devopsparadox.com/contact/…
…
continue reading
1
ServiceNow to acquire cybersecurity startup Armis, MacSync Stealer adopts quieter installation, Nissan customer data stolen in Red Hat raid
6:54
ServiceNow to acquire cybersecurity startup Armis MacSync Stealer adopts quieter installation Nissan customer data stolen in Red Hat raid Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real envir…
…
continue reading
Over the holidays we are rerunning some of our favourite episodes. This one first aired this summer and was one of my first conversations with the fascinating head of Operation Shamrock. We'll be back with regular programming on January 5th.Di Jim Love
…
continue reading
1
SN 1057: GhostPoster - Free VPNs, Hidden Risks
2:20:19
2:20:19
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
2:20:19What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
…
continue reading
1
What is TYiQ? Wrong answers only – Ep 117 (End-of-year special)
1:00:46
1:00:46
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:00:46Show notes: What is TYiQ? Wrong answers only – Ep 117 (End-of-year special)Di Testing Podcast
…
continue reading
In this episode: Alan sends Zane Lowe to a retirement home and grabs the Aux on Spotify with Auxolotl. Martin sharpens his cultlery and hard forks ffmpeg-go as ffmpeg-statigo. “Real FFmpeg bindings for Go. Not a wrapper. Not a CLI tool. The actual libraries 📚” Mark carves up his monitors with Tiling Assistant. You can send your feedback via show@li…
…
continue reading
Mike's Year End Post Mike on LinkedIn Mike's Blog Show on Discord Alice Promo Dreamcast assorted references: Dreamcast overview https://sega.fandom.com/wiki/Dreamcast History of Dreamcast development https://segaretro.org/History_of_the_Sega_Dreamcast/Development The Rise and Fall of the Dreamcast: A Legend Gone Too Soon (Simon Jenner) https://sabu…
…
continue reading
JavaScript has grown far beyond the browser. It now powers millions of backend systems, APIs, and cloud services through Node.js, which is one of the most widely deployed runtimes on the planet. Keeping such a critical piece of infrastructure fast, secure, and stable is a massive engineering challenge, and the work behind it is often invisible. Raf…
…
continue reading
On episode 87 of o11ycast, Ken Rimple and Jessica Kerr sit down with Lada Kesseler to explore how experienced engineers can work effectively with AI coding assistants. They discuss why AI feels like a fast, noisy black box, and how patterns like semantic zooming, feedback loops, testing, and observability can help developers stay in control. This e…
…
continue reading
A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker. Sponsors This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allo…
…
continue reading
In a small classroom in western China, children once learned to sing and count in the language of their ancestors — Uyghur. Then the doors were locked, and founder Abduweli Ayup went from teacher to enemy of the state. We return to the first episode in our series, ERASED. ERASED is a four-part investigation into how China is wiping Uyghur culture f…
…
continue reading
1
Spotify music library scraped, DDoS disrupts French postal services, Fake delivery sites hit holiday shoppers
6:49
Spotify music library scraped DDoS disrupts France's postal and banking services Fake delivery websites hit holiday shoppers Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join…
…
continue reading
Aji and Sally join forces to discuss the different ways they utilise active models in their workflows. Aji describes a new system for working with active models they’ve been using recently, Sally recalls a project where active models could have saved her a lot of time, before putting their heads together to think of new creative ways to utilise rai…
…
continue reading
Please enjoy this encore of Word Notes. The process of installing applications on a device without the use of official software distribution channels. CyberWire Glossary link: https://thecyberwire.com/glossary/sideloadingDi N2K Networks
…
continue reading
In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
…
continue reading
The 'age of intent' is a phrase that's been around for a number of years. However, with the rise of AI agents in 2025 it has the potential to become a key trend for 2026. It describes a new way of thinking about digital interaction in which the gap between human intention and output are reduced even further through AI assistance. Thoughtworks' APAC…
…
continue reading
Ryan welcomes Anil Dash, writer and former Stack Overflow board member, back to the show to discuss how AI is not a magical technology, but rather the normal next step in computing’s evolution. They explore the importance of democratizing access to technology, the unique challenges that LLMs’ non-determinism poses, and how developers can keep Stack…
…
continue reading
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jason Taule, CISO, Luminis Health, and Chris Ray, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zer…
…
continue reading
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
…
continue reading
Show notes: AI Optimism and PessimismDi Testing Podcast
…
continue reading
1
ep195 Yearly Platform 2025 | mozaic.fm
5:01:38
5:01:38
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
5:01:38第 195 回のテーマは 2025 年の Yearly Platform です。Show Note はこちら: https://mozaic.fm/episodes/195/yearly-platform-2025.htmlDi Jxck
…
continue reading
1
Replay: Stop Reusing Passwords
1:02:59
1:02:59
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:02:59I’m digging into the vault for a classic interview – a blast from the past! I’ve done 460 episodes over the last nearly 9 years, and some of the best old episodes still hold up well today. I first interviewed Troy Hunt, creator of Have I Been Pwned, in February of 2019. It was Episode 102 and it was entitled “You Must Stop Reusing Passwords”. In th…
…
continue reading
Scott and Wes break down the biggest web platform features that reached Baseline in 2025, separating the genuinely useful APIs from the niche and forgettable ones. From same-document view transitions and the Popover API to Promise.try, content-visibility, and modern CSS goodies, they share what’s actually ready to use today. Show Notes 00:00 Welcom…
…
continue reading
In this episode, Dave and Jamison answer these questions: Listener AWS multi-region is not real multi-region, ask me how I know asks, We’ve recently acquired some bright-eyed and bushy-tailed new grads. What have you found to be the most effective way to onboard new grads into development roles? How has it changed (if at all) since the advent of LL…
…
continue reading
Glenn is a Principal Product Manager for the App Platform team within the Developer Division at Microsoft, focusing on .NET. Before joining Microsoft Glenn was a developer in Australia where he worked on software for various government departments. Mentioned in this Episode X Account Episode 293 Episode 58 Github Microsoft Devblog Building Cloud Na…
…
continue reading
President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement an…
…
continue reading
Global Cybercrime Crackdowns and Rising Threats This episode of 'Cybersecurity Today' hosted by David Shipley covers significant cybersecurity news. Nigerian police arrested three suspects linked to a Microsoft 365 phishing platform known as Raccoon O365. U.S. prosecutors charged 54 individuals in an ATM malware scheme tied to a Venezuelan criminal…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
6:00
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
…
continue reading
Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
…
continue reading
The episode is inspired by research I conducted a few years ago in which I interviewed hundreds of other senior engineers and architects building web applications at scale. I begin by introducing the concept of micro frontends and discussing when to use them versus relying on more straightforward and reliable techniques. In the second part of the e…
…
continue reading
I’m happy to announce the start of a new series on creating APIs with C# and .NET—beginning with a series of posts, videos, and podcasts on Azure Functions and Durable Functions. You can find the video here, and the podcast is available whever you get your podcasts, or you can download it here, or you can use this player:…
…
continue reading
Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
1
Weekly Update 483
1:35:20
1:35:20
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:35:20IoT all the things! A full walkthrough of all the connected stuff, warts and all. Sponsored by 1Password. https://www.troyhunt.com/weekly-update-483/ See omnystudio.com/listener for privacy information.Di Troy Hunt
…
continue reading
Cybersecurity Today brings you a special year-end episode, featuring noteworthy guests Tammy Harper from Flare, Laura Payne from White Tuque, David Shipley from Beauceron Security, and John Pinard, co-host of Project Synapse. This episode delves into the pivotal cybersecurity stories of 2025, including a detailed discussion on MFA phishing attacks,…
…
continue reading
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
…
continue reading
1
F90: HarmonyOS | KaiCode | Капитализм | Поцелуй Брежнева | Жиглов против Шарапова
1:11:20
1:11:20
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:11:20Video is here: https://youtube.com/live/0g8ULhDGpZwDi Yegor Bugayenko
…
continue reading
1
#202 How to get promoted as a dev without becoming a manager – Staff Engineer Santosh Yadav interview
1:04:47
1:04:47
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:04:47Today Quincy Larson interviews Santosh Yadav. The son of a textile worker, he grew up inner-city Mumbai and studied hard to get into university. From there he's worked as a software engineer for 16 years. Along the way, he's picked up every distinction imaginable including Google Developer Expert, GitHub Star, and Microsoft MVP. Santosh shares tips…
…
continue reading
Links James on LinkedIn Mike on LinkedIn Mike's Blog Show on Discord Alice Promo AI on Red Hat Enterprise Linux (RHEL) Trust and Stability: RHEL provides the mission-critical foundation needed for workloads where security and reliability cannot be compromised. Predictive vs. Generative: Acknowledging the hype of GenAI while maintaining support for …
…
continue reading