EAS-MAG.digital ist eines der führenden deutschprachigen Online-Magazine für Unternehmenssoftware (ERP, CRM, Warenwirtschaft & Co.)
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
xx
…
continue reading
For Bobby
…
continue reading
A set of AI courses and news items from AI development agency SevenLab.dev
…
continue reading
Linear and Quadratic Applications
…
continue reading
CGM application step by step
…
continue reading

1
The Smart Economy Podcast: Real-World Blockchain Applications with Crypto, DeFi, NFTs, and DAOs
Ragnarok Digital, LLP
The Smart Economy Podcast features interviews with some of the most interesting people within the blockchain industry, working to make the new smart economy a reality.
…
continue reading
We discuss application of Missiles and Rockets for peaceful purposes.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Discovering HeLa Cells and an interview with myself.
…
continue reading
Welcome to the Applications of Psychology podcast, where amazing things happen.This podcast discusses how social media can be helpful to us and to our future based on psychology.
…
continue reading
Listen up to hear about my interview with 5th grade teacher Mrs. Derouen! Cover art photo provided by Jeremy Galliani on Unsplash: https://unsplash.com/@jeremyforlife
…
continue reading
…
continue reading
…
continue reading
The Truth, The Whole Truth & Nothing But The Truth About Criminal Appeal Applications In The UK
…
continue reading
In this podcast, I talk about my interests in different companies and share how I can succeed in an open role at said company.
…
continue reading
Nba 2k audio application
…
continue reading
Auditform by Formability provide cloud data acquisition and management apps for all types of organisations.
…
continue reading

1
CSE 135 - Server-side Web Applications - LE [A00] [Screencast] - Prof. Papakonstantinou, Yannis [SP15]
Papakonstantinou, Yannis
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
We are specialized in archiving legacy systems within applications decommissioning. In doing so, we have successfully implemented with hundreds of companies from a wide range of industries worldwide.
…
continue reading
Welcome to Modern Digital Applications - a podcast for corporate decision makers and executives looking to create or extend their digital business with the help of modern applications, processes, and software strategy. Your host is Lee Atchison, a recognized industry thought leader in cloud computing and published author bringing over 30 years of experience.
…
continue reading
Want to learn more about how to be admitted to a great university? Succeed in and after college? Or are you a parent who wants to learn more about higher education? Then this is the right podcast for you!
…
continue reading
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
…
continue reading
This is IJM HUB Game hub application by Ivan Odongo. This application is envisioned to simply various games predominantly played offline to online. This podcast describes how the game has a potential to improve lives of youths in Uganda and all over the world. It’s an idea yet to be implemented. Ivan welcomes potential investors to be part of this amazing project.
…
continue reading
Consists of highly motivated and proactive civilians looking to learn, train and purchase retail from trusted veteran owned businesses. Our members are dedicated to self reliance and self defense as well as creating their own network of likeminded law abiding citizens for mutual support during times of crisis.
…
continue reading
Podcast by Nicole and Adli
…
continue reading
APPLICATION SOFTWARE USED IN MASS COMMUNICATION LECTURE III JUNE 3
…
continue reading

1
Application: The TYPO3 Community Podcast
Jeffrey A. "jam" McGuire, Open Strategy Partners, TYPO3 Association
Jeffrey A. McGuire celebrates the TYPO3 community by sharing your stories, your projects, and the difference you make. Application is a narrative journey connecting developers, marketers, consultants, integrators, designers, and end-users with Jeffery’s signature conversational style. Meet the humans behind the technology.
…
continue reading
Talking about the resiliency mindset and how its used in real-world applications. Original music composed by Tyson Collier.
…
continue reading
A Columbia University undergrad and his old teacher talk about college admissions: how students can craft the best college application, how teachers and administrators can help them, and how colleges can improve the system.
…
continue reading
Listen to software how-to's, information on next generation gaming consoles, the latest in gadgets and tech news.
…
continue reading
For practicing acupuncturists, each episode in this weekly podcast explores needling technique, indications, and clinical applications for a set of five individual acupuncture points. Over 300 points are discussed in detail. The conversation is based on the personal experiences of two seasoned practitioners, each with over 30 years of clinical practice. For acupuncture continuing education credits, view these classes online at https://acupunctureceuonline.com Dr. Daoshing Ni is the co-founde ...
…
continue reading

1
Heights and Distances (Part 1) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
RIApodcast - we discuss the latest news and topics in Rich Internet Applications and Technologies
John Mason
A technology podcast focusing on Rich Internet Technologies such as ColdFusion, Flex, Flash, jQuery and AIR.
…
continue reading

1
Alan Wallace Fall 2012 Retreat Podcast: Vipashyana, Four Applications of Mindfulness
B. Alan Wallace
Teachings from the eight-week retreat at Thanyapura Mind Centre, Phuket, Thailand
…
continue reading

1
Similar to triangle (Part 2) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
Heights and Distances (Part 2) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
Heights and Distances ( Part 3) Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
Heights and Distances (Part 2) Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
Wie die Softwaremodernisierung das digitale Immunsystem kräftigt
3:52
3:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
3:52Bedrohungen für IT-Systeme lauern auf allen Seiten – von Phishing-Attacken über komplexe Angriffe auf die Infrastruktur bis zum gezielten Ausnutzen von Schwachstellen. Ein starkes digitales Immunsystem ist dabei für die Früherkennung und Abwehr entscheidend – ohne die Modernisierung der Software öffnen sich allerdings drastische Lücken im digitalen…
…
continue reading

1
Mistral OCR & OpenAI new voice capabilities | Mar 31, 2025
22:57
22:57
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:57Discover how the latest OCR and voice technology advancements from Mistral and OpenAI are revolutionizing business processes! In this episode, Bas Alderding and Koen Ter Velde explore: ✅ Mistral's breakthrough OCR technology with superior accuracy for complex documents ✅ OpenAI's new audio models for speech-to-text and text-to-speech capabilities ✅…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
Are Stablecoins Crypto's Achilles' Heel? Quai Network's Energy-Backed Alternative with Alan Orwick
1:00:13
1:00:13
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:00:13In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Alan Orwick, the CEO of Dominant Strategies, a development entity creating tooling and applications on the Quai Network. What You’ll Learn: Why traditional stablecoins represent an "Achilles heel" for crypto How Quai Network's dual-token model (QUAI and QI) creates a co…
…
continue reading

1
Managing Secrets - Vlad Matsiiako - ASW #327
1:03:03
1:03:03
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:03:03Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
…
continue reading

1
Managing Secrets - Vlad Matsiiako - ASW #327
1:03:03
1:03:03
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:03:03Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
…
continue reading

1
Diese fünf Trends werden das KI-Jahr 2025 prägen
5:04
5:04
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:04Unternehmen beseitigen Tool-Wildwuchs, lassen ihre Mitarbeitenden mit organisationseigenen Daten chatten und sorgen für Transparenz: KI-Spezialist IntraFind prognostiziert GenAI-Trends für das Jahr 2025. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digital/diese-fuenf-trends-werden-das-ki-jahr-2025-praegen/…
…
continue reading

1
Diese neun Aspekte müssen leistungsfähige ERP-Lösungen mitbringen
5:44
5:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:44So wichtig ERP-Systeme auch sind, bei der Auswahl der richtigen Lösung und Anbieter gibt es für Unternehmen eine Reihe von Aspekten zu beachten – schließlich bringen nur passgenaue und ausgereifte Systeme auch die erwünschten Vorteile. IFS erklärt, worauf es bei der Suche ankommt. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/diese-…
…
continue reading

1
Diese Trends erwarten uns 2025 in der Daten- und Dokumentenarchivierung
3:54
3:54
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
3:54Der Wechsel auf SAP S/4HANA wird im kommenden Jahr nochmals an Dringlichkeit gewinnen und damit auf die Archivierungsprozesse ausstrahlen. Der Umstieg zwingt die Unternehmen dazu, ihre Daten- und Dokumentenverwaltung, inklusive deren Archivierung, neu zu denken und bestehende Lösungen so anzupassen, dass sie mit den Anforderungen an Flexibilität, P…
…
continue reading

1
More WAFs in Blocking Mode and More Security Headaches from LLMs - Sandy Carielli, Janet Worthington - ASW #326
1:14:45
1:14:45
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:14:45The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
…
continue reading

1
More WAFs in Blocking Mode and More Security Headaches from LLMs - Sandy Carielli, Janet Worthington - ASW #326
1:14:45
1:14:45
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:14:45The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. WAFs are delivering value in a way that orgs are relying on them more for bot management and fraud detection. But adopting phishing-resistant authentic…
…
continue reading

1
Trust vs. Truth: Redesigning Digital Identity for the Decentralized Web with Ingo Ruebe
53:29
53:29
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
53:29In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Ingo Ruebe, the founder of Kilt Protocol, a decentralized digital identity solution serving enterprises, governments, and consumers. What You’ll Learn: Why Web2 identity is fundamentally broken The difference between identity and identification How W3C standards are res…
…
continue reading

1
In Search of Secure Design - ASW #325
1:07:36
1:07:36
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:07:36We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
…
continue reading

1
In Search of Secure Design - ASW #325
1:07:36
1:07:36
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:07:36We have a top ten list entry for Insecure Design, pledges to CISA's Secure by Design principles, and tons of CVEs that fall into familiar categories of flaws. But what does it mean to have a secure design and how do we get there? There are plenty of secure practices that orgs should implement are supply chains, authentication, and the SDLC. Those p…
…
continue reading

1
Drei Anwendungsfelder für generative Künstliche Intelligenz in der Produktion
5:51
5:51
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:51Künstliche Intelligenz (KI) hat das Potenzial, unsere heutige Arbeitsweise völlig auf den Kopf zu stellen. Seit Jahren arbeiten branchenübergreifend Unternehmen daran, Machine und Deep Learning und weitere KI-basierte Algorithmen einzuführen, um zum Beispiel mit selbstlernenden Systemen große Datenmassen auszuwerten und mit darauf aufbauender Muste…
…
continue reading

1
Dynamik des technischen Wandels nimmt weiter zu
3:43
3:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
3:43Die im Wandel befindliche Weltwirtschaft hat den Unternehmen im zurückliegenden Jahr viele Veränderungen und Anpassungen abverlangt. Dieser Trend wird sich nach Einschätzung von Patric Dahse, CEO der Natuvion Group, im kommenden Jahr fortsetzen. Lesen Sie den ganzen Beitrag hier: https://de.eas-mag.digital/dynamik-des-technischen-wandels-nimmt-weit…
…
continue reading

1
Avoiding Appsec's Worst Practices - ASW #324
1:11:19
1:11:19
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:11:19We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
…
continue reading

1
Avoiding Appsec's Worst Practices - ASW #324
1:11:19
1:11:19
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:11:19We take advantage of April Fools to look at some of appsec's myths, mistakes, and behaviors that lead to bad practices. It's easy to get trapped in a status quo of chasing CVEs or discussing which direction to shift security. But scrutinizing decimal points in CVSS scores or rearranging tools misses the opportunity for more strategic thinking. We s…
…
continue reading

1
Media, Money, and Misunderstandings: Bankless Sets the Record Straight with David Hoffman
55:12
55:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
55:12In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by David Hoffman, the co-founder and host of Bankless, a cryptocurrency media brand and community that focuses on educating and empowering individuals to navigate the decentralized financial landscape. What You’ll Learn: The journey from Ethereum maximalism to broader cryp…
…
continue reading

1
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323
54:08
54:08
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
54:08LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
…
continue reading

1
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323
54:08
54:08
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
54:08LLMs are helping devs write code, but is it secure code? How are LLMs helping appsec teams? Keith Hoodlet returns to talk about where he's seen value from genAI, where it fits in with tools like source code analysis and fuzzers, and where its limitations mean we'll be relying on humans for a while. Those limitations don't mean appsec should dismiss…
…
continue reading

1
Ausblick künstliche Intelligenz (KI) in Operations, Softwareentwicklung und Compliance
5:42
5:42
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:42Im Jahr 2025 wird die Rolle der künstlichen Intelligenz (KI) in Operations, Softwareentwicklung und Compliance rasant voranschreiten und transformative Auswirkungen auf verschiedene Branchen haben. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/ausblick-kuenstliche-intelligenz-ki-in-operations-softwareentwicklung-und-compliance/…
…
continue reading

1
Fünf Schritte für vertrauenswürdige IoT-Daten
5:28
5:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:28Unternehmen, die IoT-Lösungen einsetzen, benötigen eine Datenqualitätsstrategie. Was bei BI und der Analyse sowie Aufbereitung betriebswirtschaftlicher Daten vielfach verbreitet ist, sollten Unternehmen auch bei IoT-Daten etablieren. Wir erläutern die wichtigsten Maßnahmen für Aufbau und Betrieb eines Programms zur Erreichung einer hohen Datenquali…
…
continue reading

1
Schritt für Schritt zur perfekten Customer Journey Map
5:35
5:35
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:35Die Customer Journey beschreibt den gesamten Prozess, den ein Kunde in der Interaktion mit einem Unternehmen durchläuft: Von der ersten Kontaktaufnahme bis zum Support nach dem Kauf interagiert er an verschiedenen Touchpoints mit dem Unternehmen. Den ganzen Beitrag können Sie hier lesen: https://de.eas-mag.digital/schritt-fuer-schritt-zur-perfekten…
…
continue reading

1
B2B-Integration ganzheitlich betrachtet
10:44
10:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
10:44Die eigenen Geschäftsprozesse mit denen anderer Unternehmen intelligent zu verzahnen, ist speziell für KMUs in einem zunehmend digitalisierten und globalisierten Marktumfeld zentral wichtig, um wettbewerbsfähig zu bleiben. KMUs haben oftmals deutlich schlankere Kostenstrukturen als Großunternehmen. Diesen Vorteil können sie aber nur dann ausspielen…
…
continue reading

1
Javan Rasokat and Andra Lezza -- When Chatbots Go Rogue - Lessons Learned from Building and Defending LLM Applications
47:31
47:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
47:31Andra Lezza and Javan Rasokat discuss the complexities of securing AI and LLM applications. With years of experience in Application Security (AppSec), Andra and Javan share their journey and lessons from their DEF CON talk on building and defending LLMs. They explore critical vulnerabilities, prompt injection, hallucinations, and the importance of …
…
continue reading

1
Redlining the Smart Contract Top 10 - Shashank - ASW #322
53:01
53:01
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
53:01The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
…
continue reading

1
Redlining the Smart Contract Top 10 - Shashank . - ASW #322
53:01
53:01
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
53:01The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
…
continue reading

1
Herkules-Aufgabe Datenbankmanagement: Fünf Aspekte, die Führungskräfte über Datenbanken wissen sollten
5:29
5:29
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
5:29Die Datenbanklandschaft hat sich in den letzten zehn Jahren gravierend verändert. Wo früher meist eine einzige Plattform zum Einsatz kam, entsteht in vielen Unternehmen heute geradezu ein Wildwuchs an unterschiedlichen Technologien. Redgate, führender Anbieter von DevOps-Lösungen für End-to-End-Datenbankmanagement, nennt fünf Gründe, wie es dazu ka…
…
continue reading

1
Building Web3's Community Infrastructure: Galxe's Vision for Digital Identity with Patrick Young
58:29
58:29
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
58:29In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Patrick Young, Head of Go-to-Market at Galxe, a platform for Web3 community growth and engagement. Join them as they: Delve into Patrick's background in blockchain Explain how Galxe builds and maintains resilient Web3 communities Discuss Galxe's identity solutions, incl…
…
continue reading

1
Skype Hangs Up, Android Backdoors, Jailbreak Research, Pretend AirTags, Wallbleed - ASW #321
33:17
33:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
33:17Skype hangs up for good, over a million cheap Android devices may be backdoored, parallels between jailbreak research and XSS, impersonating AirTags, network reconnaissance via a memory disclosure vuln in the GFW, and more! Show Notes: https://securityweekly.com/asw-321
…
continue reading

1
Augmented RAG with n8n | Mar 5, 2025
24:14
24:14
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
24:14Keywords AI, business, document management, retrieval augmented generation, proof of concept, facility management, asylum seekers, technology, innovation, data processing Summary In this podcast episode, Bas Alderding and Koen Ter Velde discuss the practical applications of AI in business, specifically focusing on a proof of concept (POC) they deve…
…
continue reading