Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
The two TypeScript Fools, Kamran Ayub and Erik Onarheim, get together once a week to bring you news, community highlights, and deep dives into the TypeScript ecosystem. Stay up-to-date on what's happening and learn new things to make you a better TypeScript developer along the way!
…
continue reading
Technical interviews about software topics.
…
continue reading
Paul and Nick discuss weekly topics about Technology, IoT, software design and applications.
…
continue reading
Authmaker is a tool and a curriculum that provides guiding principals for developing full stack applications. This podcast aims to explore some of those guiding principles and help new and existing developers get up to speed with building web apps incredibly quickly. To find out more about what Authmaker is, listen to the first episode of this podcast where we explore that exact question.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
This week's JavaScript news, in 4 min or less.
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
The only engineering podcast with a 2 drink minimum! Full stack developers Jared Palmer and Ken Wheeler have peer-to-peer conversations with world-class engineers about software development.
…
continue reading
Anywhere Club Podcasts - is a tech podcast whose goal is to help people learn new technologies, find a job, and join a professional tech and IT community 😊
…
continue reading
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑🏫 Courses I Te ...
…
continue reading
Podcast by io.js
…
continue reading
We bring a collection of stories and insights worth listening on the latest technology trends, updates, news, reviews, tutorials & more. Join in!
…
continue reading
A podcast about web development, tech trends, and coding best practices
…
continue reading
The podcast for all things JavaScript, OpenHive.JS presents conversations with key contributors and open source leaders around new developments, challenges and perspectives in JS technology. Hosted by James Snell and Matteo Collina, OpenHive.JS publishes new episodes monthly and is produced and distributed by NearForm.
…
continue reading
Evrone is an engineering company successfully delivering high-quality digital products for more than nine years. With extensive experience in a wide range of modern software technologies, we are here to help you to design unique complex web projects and startups. Our websites: https://evrone.com/ https://evrone.ru
…
continue reading
Since its inception in 2011, Best Remote Team, an offshore web and mobile app development company, is offering high-quality offshore software and app development services by facilitating businesses with the right and skilled technical brains. You can hire a remote team of dedicated developers with the right skills and attitude for your project. Hire dedicated developers after a thorough screening process and a personal interview to find the best match as per your expectations.
…
continue reading
Seven Peaks Speaks is brought to you by Seven Peaks Software with the goal to share knowledge and build an ecosystem in Bangkok and Asia for software engineering, design, and marketing related topics. Follow our Podcast Seven Peaks Speaks to not miss out on new episodes! Visit our Website http://www.sevenpeakssoftware.com for more information about Seven Peaks Software Email us for any inquiries at [email protected]
…
continue reading
Big announcements, conferences, the hallway track. We’re in the trenches having awesome conversations with real people from the community. This show features conversations from technology and software development events such as O’Reilly’s OSCON, All Things Open, Node Interactive (covering the Future of Node.js and JavaScript), and more. Hosts Adam Stacoviak and Jerod Santo talk to software engineers, keynote speakers, industry experts, and passionate attendees about open source, software ind ...
…
continue reading
The Mechanical Ink podcast is a podcast about the open-source ecosystem. We speak to project maintainers, open-source companies, and companies who play a critical role in ensuring a healthy ecosystem. We ask the tough questions but also celebrate the wins and acknowledge open-source software's critical role in the world. schalkneethling.substack.com
…
continue reading

1
MUST KNOW JavaScript features in 2025, Google Firebase Studio, amazing Node.js playbook, and more EP30 JavaScript News
3:45
3:45
Play later
Play later
Lists
Like
Liked
3:45Today, we'll be talking about some must-know JavaScript features in 2025, Google's vibe coding platform, Firebase Studio, and more! Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your friends!By Jam.dev
…
continue reading

1
SANS Stormcast Tuesday Mar 18th 2025: Analyzing GUID Encoded Shellcode; Node.js SAML Vuln; Tomcat RCE in the Wild; CSS e-mail obfuscation
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Static Analysis of GUID Encoded Shellcode Didier explains how to decode shell code embeded as GUIDs in malware, and how to feed the result to his tool 1768.py which will extract Cobal Strike configuration information from the code. https://isc.sans.edu/diary/Static%20Analysis%20of%20GUID%20Encoded%20Shellcode/31774 SAMLStorm: Critical Authenticatio…
…
continue reading
No technical video today, just talking about the idea of discipline and consistency.
…
continue reading

1
SANS Stormcast Friday April 11th: Network Infraxploit; Windows Hello Broken; Dell Update; Langflow Exploit
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
…
continue reading
Mitchell Hashimoto, founder of HashiCorp, joins us to talk about his latest project, Ghostty—a terminal that’s fast, feature-rich, and truly cross-platform. Mitchell shares the vision behind Ghostty, its architecture built around the libghosty core, how it's tackling long-standing limitations in terminal emulation, and why features like quake-style…
…
continue reading

1
Turing Award Special: A Conversation with David Patterson
55:46
55:46
Play later
Play later
Lists
Like
Liked
55:46David A. Patterson is a pioneering computer scientist known for his contributions to computer architecture, particularly as a co-developer of Reduced Instruction Set Computing, or RISC, which revolutionized processor design. He has co-authored multiple books, including the highly influential Computer Architecture: A Quantitative Approach. David is …
…
continue reading

1
SANS Stormcast ThursdayApril 10th: Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide;
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
…
continue reading

1
SANS Stormcast Wednesday, April 10th: Microsoft Patch Tuesday; Adobe Patches; OpenSSL 3.5 with PQC; Fortinet
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
…
continue reading

1
Enums in JS, Deno v Oracle Cage Match, and Parcel Gets React Server Components | Grab Bag | Ep 12
31:21
31:21
Play later
Play later
Lists
Like
Liked
31:21This week on the pod, we were very busy with travel, cons, and sickness! We have a news grab bag episode talking about the JS enums proposal, Deno v. Oracle, Parcel+RSCs, Firefox vulnerabilities and more! Also Please email us your feedback for your retro episode ([email protected]) 00:00 Intro 00:50 VGM Con 02:07 IGDATC Talk Wednesday April 9t…
…
continue reading

1
Uber’s On-Call Copilot with Paarth Chothani and Eduards Sidorovics
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
…
continue reading
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
…
continue reading

1
Breaking Into Tech: Lessons from My Career Path - JsJ 672
44:11
44:11
Play later
Play later
Lists
Like
Liked
44:11This episode is a little different—thanks to a U.S. holiday, I’m flying solo. But that just means we get to have a one-on-one chat! I dive into my career journey—not to brag, but to offer insights for anyone feeling stuck, of how my inventor grandfather sparked my early interest in tech, how I transitioned from electrical engineering to computer en…
…
continue reading

1
SANS Stormcast Monday April 7th 2025: New Username Report; Quickshell Vulnerability; Apache Traffic Director Request Smuggeling
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
…
continue reading

1
React 19.1 is out, new JavaScript runtime better than Node.js, Safari 18.4 brings new WebKit features, and more EP29 JavaScript News
3:04
3:04
Play later
Play later
Lists
Like
Liked
3:04Today, we'll be talking about the React 19.1 update, Bare, a new JavaScript runtime, Safari's 18.4 update, and more. Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your friends!By Jam.dev
…
continue reading

1
Socket management and Kernel Data structures
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26Fundamentals of Operating Systems Course This video is an overview of how the operating system kernel does socket management and the different data structures it utilizes to achieve that. timestamps 0:00 Intro 1:38 Socket vs Connections 7:50 SYN and Accept Queue 18:56 Socket Sharding 23:14 Receive and Send buffers 27:00 Summary…
…
continue reading

1
SANS Stormcast Friday, Apr 4th: URL Frequency Analysis; Ivanti Flaw Exploited; WinRAR MotW Vuln; Tax filing scams; Oracle Breach Update
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Mea…
…
continue reading

1
Put your database in the browser with Ben Holmes
32:25
32:25
Play later
Play later
Lists
Like
Liked
32:25Ben Holmes, product engineer at Warp, joins PodRocket to talk about local-first web apps and what it takes to run a database directly in the browser. He breaks down how moving data closer to the user can reduce latency, improve performance, and simplify frontend development. Learn about SQLite in the browser, syncing challenges, handling conflicts,…
…
continue reading

1
Turing Award Special: A Conversation with John Hennessy
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53John Hennessy is a computer scientist, entrepreneur, and academic known for his significant contributions to computer architecture. He co-developed the RISC architecture, which revolutionized modern computing by enabling faster and more efficient processors. Hennessy served as the president of Stanford University from 2000 to 2016 and later co-foun…
…
continue reading

1
SANS Stormcast Thursday Apr 3rd: Juniper Password Scans; Hacking Call Records; End to End Encrypted GMail
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
…
continue reading

1
SANS Stormcast Wednesday Apr 2nd: Apple Updates Everything;
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Apple Patches Everything Apple released updates for all of its operating systems. Most were released on Monday with WatchOS patches released today on Tuesday. Two already exploited vulnerabilities, which were already patched in the latest iOS and macOS versions, are now patched for older operating systems as well. A total of 145 vulnerabilities wer…
…
continue reading

1
Sourcegraph and the Frontier of AI in Software Engineering with Beyang Liu
44:19
44:19
Play later
Play later
Lists
Like
Liked
44:19Sourcegraph is a powerful code search and intelligence tool that helps developers navigate and understand large codebases efficiently. It provides advanced search functionality across multiple repositories, making it easier to find references, functions, and dependencies. Additionally, Sourcegraph integrates with various development workflows to st…
…
continue reading

1
SANS Stormcast Tuesday Apr 1st: Apache Camel Exploits; New Cert Authorities Requirements; Possible Oracle Breach
7:36
7:36
Play later
Play later
Lists
Like
Liked
7:36Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Camel has been integrated into some vulnerability scanners, like for example OpenVAS. We do see some exploit attempts in our honeypots, but they appear to be part of internal vulnerablity scans https://isc.sans.edu/diary/Apache%20Camel%20Exploit%20Attempt…
…
continue reading

1
Pioneers of Computing: A Journey Through Tech History with Bob Martin - JsJ 671
1:09:49
1:09:49
Play later
Play later
Lists
Like
Liked
1:09:49In this episode, we dive into a fascinating mix of tech history, personal stories, and entertainment recommendations. We chat with Bob Martin, who shares insights from his new book, offering a look back at the pioneers of computing, including early breakthroughs and the industry's evolution. Bob talks about the challenges of leaving out influential…
…
continue reading
This week on the pod, we talk all about the Bun runtime funtimes! This is a powerful new player in the JavaScript and TypeScript runtime space focusing on DX, speed, and pushing the state of the art! We dive into the details and offer some of our thoughts around when to use it at the moment. In other news we avoid phone scams and talk fun new TypeS…
…
continue reading

1
SANS Stormcast Monday, March 31st: Comparing Phishing Sites; DOH and MX Abuse Phishing; opkssh
7:15
7:15
Play later
Play later
Lists
Like
Liked
7:15A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site itself appears to be visually very similar. Phishing kits are often copied and modified, leading to sites using similar visual tricks on the user facing site, but very different backends to host the sites and reporting data to the miscreant. https://is…
…
continue reading

1
Your Next.js website might be hacked, ChatGPT-4o Image Generation, State of Vue.js 2025, and more EP28 JavaScript News
3:36
3:36
Play later
Play later
Lists
Like
Liked
3:36Today, we'll be talking about Next.js' security vulnerability, ChatGPT-4o's game-changing image generation features and how it can be used in JavaScript apps, and The State of Vue.js Report 2025! Visit ThisWeekinJavaScript.com to subscribe to our Newsletter. Make sure you subscribe to the podcast for weekly updates and share this podcast with your …
…
continue reading

1
SANS Stormcast Friday, March 28th: Sitecore Exploited; Blasting Past Webp; Splunk and Firefox Vulnerabilities
6:15
6:15
Play later
Play later
Lists
Like
Liked
6:15Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
…
continue reading

1
Gemini, ChatGPT, and Alibaba: Who Leads the AI Revolution? / AIA UK Podcast #1
1:32:28
1:32:28
Play later
Play later
Lists
Like
Liked
1:32:28In this first episode of our new podcast, Gordon Mullan and Govind Shukla discuss the latest news in the world of AI, plus other news from robotics, ethics, regulation, and more! NAVIGATION 00:00 - Introduction 06:42 - Google 18:15 - OpenAI 21:44 - Microsoft 40:08 - Mistral 45:16 - China: Alibaba 52:40 - China: Manus 56:30 - Windsurf Editor 57:40 -…
…
continue reading

1
Debugging apps with Deno and OpenTelemetry with Luca Casonato
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55Luca Casanato, member of the Deno core team, delves into the intricacies of debugging applications using Deno and OpenTelemetry. Discover how Deno's native integration with OpenTelemetry enhances application performance monitoring, simplifies instrumentation compared to Node.js, and unlocks new insights for developers! Links https://lcas.dev https:…
…
continue reading

1
Turing Award Special: A Conversation with Jeffrey Ullman
37:45
37:45
Play later
Play later
Lists
Like
Liked
37:45Jeffrey Ullman is a renowned computer scientist and professor emeritus at Stanford University, celebrated for his groundbreaking contributions to database systems, compilers, and algorithms. He co-authored influential texts like Principles of Database Systems and Compilers: Principles, Techniques, and Tools (often called the “Dragon Book”), which h…
…
continue reading

1
SANS Stormcast Thursday Mar 27th: Classifying Malware with ML; Malicious NPM Packages; Google Chrome 0-day
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest This diary explores a novel methodology for classifying malware by integrating entropy-driven feature selection with a specialized Convolutional Neural Network (CNN). Motivated by the increasing obfuscation tactics used by modern malware authors,…
…
continue reading

1
SANS Stormcast Wednesday Mar 26th: XWiki Exploit; File Converter Correction; VMWare Vulnerability; Draytek Router Reboots; MMC Exploit Details;
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code te…
…
continue reading

1
Knowledge Graphs as Agentic Memory with Daniel Chalef
53:39
53:39
Play later
Play later
Lists
Like
Liked
53:39Contextual memory in AI is a major challenge because current models struggle to retain and recall relevant information over time. While humans can build long-term semantic relationships, AI systems often rely on fixed context windows, leading to loss of important past interactions. Zep is a startup that’s developing a memory layer for AI agents usi…
…
continue reading

1
SANS Stormcast Tuesday Mar 25th: Privacy Awware Bots; Ingress Nightmare; Malicious File Converters; VSCode Extension Leads to Ransomware
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them. https://isc.sans.edu/diary/Privacy%20Aware%20Bots/31796 Critical Ingress Nightmare Vulnerability ingress-nginx fixed four new vulnerabilities, one of which ma…
…
continue reading