EAS-MAG.digital ist eines der führenden deutschprachigen Online-Magazine für Unternehmenssoftware (ERP, CRM, Warenwirtschaft & Co.)
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
xx
…
continue reading
For Bobby
…
continue reading
Learn how to Check application status quickly and easily with our detailed guide on the Application Status of Asaan Karobar Finance. This step-by-step walkthrough will help you track your loan application progress, resolve common verification issues, and understand what each status means.
…
continue reading
CGM application step by step
…
continue reading

1
The Smart Economy Podcast: Real-World Blockchain Applications with Crypto, DeFi, NFTs, and DAOs
Ragnarok Digital, LLP
The Smart Economy Podcast features interviews with some of the most interesting people within the blockchain industry, working to make the new smart economy a reality.
…
continue reading
We discuss application of Missiles and Rockets for peaceful purposes.
…
continue reading
Discovering HeLa Cells and an interview with myself.
…
continue reading
Welcome to the Applications of Psychology podcast, where amazing things happen.This podcast discusses how social media can be helpful to us and to our future based on psychology.
…
continue reading
Listen up to hear about my interview with 5th grade teacher Mrs. Derouen! Cover art photo provided by Jeremy Galliani on Unsplash: https://unsplash.com/@jeremyforlife
…
continue reading
…
continue reading
A podcast about Application Security DevSecOps and AppScan. Twice a month, we aim to bring you some technical insights, assorted facts and the latest news from the world of HCL AppScan. Our underlying mission is to deliver continuous application security to the masses.
…
continue reading
…
continue reading
The Truth, The Whole Truth & Nothing But The Truth About Criminal Appeal Applications In The UK
…
continue reading
In this podcast, I talk about my interests in different companies and share how I can succeed in an open role at said company.
…
continue reading

1
Peace Over Perfection | Scripture, Devotions, Biblical Encouragement, Bible Verses for Anxiety, Biblical Application | Trusting God
Susan Shropshire
Welcome to Peace Over Perfection — the podcast that helps overwhelmed Christian women trust God in everyday situations. Do you feel like you’re running on empty — physically, emotionally, or even spiritually? Are you buried in expectations, to-do lists, and the pressure to have it all together? Do you ever feel guilty for only turning to God when things go wrong? You’re not alone — and you’re in the right place. I’m Susan — wife, empty nester, small business owner, and fellow faith-walker wh ...
…
continue reading
Nba 2k audio application
…
continue reading
Auditform by Formability provide cloud data acquisition and management apps for all types of organisations.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
We are specialized in archiving legacy systems within applications decommissioning. In doing so, we have successfully implemented with hundreds of companies from a wide range of industries worldwide.
…
continue reading
The Future of Application Security is a podcast for ambitious leaders who want to build a modern and effective AppSec program. Doing application security right is really hard and we want to help other experts build the future of AppSec by curating the best industry insights, tips and resources. What’s the most important security metric to measure in 2024? It’s Mean Time to Remediate (MTTR). Download our new MTTR guide: https://lnkd.in/evjcf4Vt
…
continue reading
It's Time is the Bible-teaching radio ministry of Mike Kestler, pastor of The River Christian Fellowship in Twin Falls, Idaho, home of CSN International.
…
continue reading
Welcome to Modern Digital Applications - a podcast for corporate decision makers and executives looking to create or extend their digital business with the help of modern applications, processes, and software strategy. Your host is Lee Atchison, a recognized industry thought leader in cloud computing and published author bringing over 30 years of experience.
…
continue reading
Want to learn more about how to be admitted to a great university? Succeed in and after college? Or are you a parent who wants to learn more about higher education? Then this is the right podcast for you!
…
continue reading
This is IJM HUB Game hub application by Ivan Odongo. This application is envisioned to simply various games predominantly played offline to online. This podcast describes how the game has a potential to improve lives of youths in Uganda and all over the world. It’s an idea yet to be implemented. Ivan welcomes potential investors to be part of this amazing project.
…
continue reading
Consists of highly motivated and proactive civilians looking to learn, train and purchase retail from trusted veteran owned businesses. Our members are dedicated to self reliance and self defense as well as creating their own network of likeminded law abiding citizens for mutual support during times of crisis.
…
continue reading
A Columbia University undergrad and his old teacher talk about college admissions: how students can craft the best college application, how teachers and administrators can help them, and how colleges can improve the system.
…
continue reading
Podcast by Nicole and Adli
…
continue reading
APPLICATION SOFTWARE USED IN MASS COMMUNICATION LECTURE III JUNE 3
…
continue reading

1
Application: The TYPO3 Community Podcast
Jeffrey A. "jam" McGuire, Open Strategy Partners, TYPO3 Association
Jeffrey A. McGuire celebrates the TYPO3 community by sharing your stories, your projects, and the difference you make. Application is a narrative journey connecting developers, marketers, consultants, integrators, designers, and end-users with Jeffery’s signature conversational style. Meet the humans behind the technology.
…
continue reading
A set of AI courses and news items from AI development agency SevenLab.dev
…
continue reading
Our mission is to build a technology-enabled community to improve the health and wellness of medical patients and user alike, through data optimization of medical cannabis research and production. Our Citizen Green platform is the world’s first medical cannabis network that builds a cross-industries knowledge base which drives confidence in cannabis products, enhances prescription efficacy, and improves the lives of patients around the world.
…
continue reading
Talking about the resiliency mindset and how its used in real-world applications. Original music composed by Tyson Collier.
…
continue reading
Listen to software how-to's, information on next generation gaming consoles, the latest in gadgets and tech news.
…
continue reading
For practicing acupuncturists, each episode in this weekly podcast explores needling technique, indications, and clinical applications for a set of five individual acupuncture points. Over 300 points are discussed in detail. The conversation is based on the personal experiences of two seasoned practitioners, each with over 30 years of clinical practice. For acupuncture continuing education credits, view these classes online at https://acupunctureceuonline.com Dr. Daoshing Ni is the co-founde ...
…
continue reading

1
Heights and Distances (Part 1) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
RIApodcast - we discuss the latest news and topics in Rich Internet Applications and Technologies
John Mason
A technology podcast focusing on Rich Internet Technologies such as ColdFusion, Flex, Flash, jQuery and AIR.
…
continue reading

1
Alan Wallace Fall 2012 Retreat Podcast: Vipashyana, Four Applications of Mindfulness
B. Alan Wallace
Teachings from the eight-week retreat at Thanyapura Mind Centre, Phuket, Thailand
…
continue reading

1
Similar to triangle (Part 2) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading

1
Heights and Distances (Part 2) | Some Applications of Trigonometry | CBSE | Class 10 | Math
Shiksha Abhiyan
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading
This podcast is a part of a series for, CBSE Class 10 Maths. We recommend that you take a look at our YouTube channel, to enter this new world of virtual learning at its best. || Youtube: Shiksha Abhiyan || t.ly/dN9j8 ||
…
continue reading
Generative KI schickt sich an, die Prozesse und Arbeitsmethoden von Behörden und Unternehmen zu revolutionieren. Eine Herausforderung bleibt jedoch die Wahl des richtigen Large Language Model (LLM), denn es gibt viele Faktoren zu beachten – etwa die Modellgröße, die Sprachunterstützung sowie die Kosten und die Sicherheit. KI- und Enterprise-Search-…
…
continue reading
We’re discussing the intersections of application security (AppSec) and sales strategy with our guest, Sean Varga. Sean shares the unique challenges and best practices in AppSec sales, like the importance of empathy, understanding customer needs, and community participation. Learn about the OWASP top 10 for AppSec Sales and discover how to achieve …
…
continue reading
Feeling Anxious? 8 Faith-Based Ways to Help You Find Peace Do you feel overwhelmed by anxious thoughts, fears about the future, or that low-grade worry that never fully lets go? Do you wish you could actually rest—mentally, emotionally, and spiritually—even when life doesn’t slow down? In this episode, we’re diving into what the Bible says about wo…
…
continue reading

1
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339
1:07:50
1:07:50
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:07:50What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
…
continue reading
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Josh McIntyre, Chairperson of the CCE Committee at C4, a non-profit organization advancing the understanding and adoption of Bitcoin, cryptocurrency, blockchain technology, and secure private key management. Together, they explore essential blockchain security practices…
…
continue reading
Do you feel guilty when your day gets away from you and time with God doesn’t happen? Ever wonder if your quick prayers or scattered spiritual moments really “count”? Do you long to feel spiritually grounded—even in the middle of your busiest days? In this episode, I’m sharing how to stay spiritually connected with God throughout your day—even when…
…
continue reading

1
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339
1:07:50
1:07:50
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:07:50What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
…
continue reading
UiPath, führender Anbieter für Enterprise Robotic Process Automation, beleuchtet kurz und bündig die zentralen Aspekte rund um RPA. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/die-wichtigsten-fragen-zu-rpa-hier-beantwortet/EAS-MAG.digital
…
continue reading
Vier von fünf Unternehmen haben kein schlüssiges Konzept, um den Herausforderungen der fortschreitenden Digitalisierung strategisch zu begegnen. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/5-huerden-beim-digitalen-wandel/EAS-MAG.digital
…
continue reading
Welcome to Peace Over Perfection, a podcast that invites you to let go of striving for a picture-perfect faith routine and instead embrace a genuine walk with God in the midst of life's chaos. Hosted by Susan, a dedicated wife, mom, and small business owner, this episode dives deep into the emotional and physical exhaustion many of us face. Do you …
…
continue reading
Das Gelingen des digitalen Wandels hängt maßgeblich davon ob, ob auch die Mitarbeiter mitziehen können. Daher ist ein neuer Mitarbeitertyp unter Industrie 4.0 gefragt. Den ganzen Beitrag lesen sie hier: https://de.eas-mag.digital/der-mitarbeitertyp-unter-industrie-4-0/EAS-MAG.digital
…
continue reading
Sarah Jane Madden joins us to discuss the evolving role of AI in software development. We reflect on the changes and challenges posed by AI, including the potential for over-reliance and the misconception that traditional software engineering practices like the SDLC are obsolete. The conversation explores the nuances of AI-generated code, emphasizi…
…
continue reading

1
Checking in on the State of Appsec in 2025 - Janet Worthington, Sandy Carielli - ASW #338
1:07:15
1:07:15
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:07:15Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
…
continue reading

1
Checking in on the State of Appsec in 2025 - Sandy Carielli, Janet Worthington - ASW #338
1:07:15
1:07:15
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:07:15Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
…
continue reading
Revolutionen kommen öfter vor, als man denkt. In der Cybersecurity gab es beispielsweise bereits mehrere Revolutionen, in denen neue Technologien wie Künstliche Intelligenz und Machine Learning alles bisher Dagewesene auf den Kopf stellten. Ontinue, der führende Experte für Managed Extended Detection and Response (MXDR), wirft einen Blick in die Ge…
…
continue reading
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Sam MacPherson, CEO and co-founder of Phoenix Labs, the R&D company behind the multi-chain DeFi platform Spark. What you’ll learn: How Spark Liquidity Layer helps solve cross-chain fragmentation by automatically deploying capital across multiple L2s Why the transition f…
…
continue reading
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading
Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading
Welche Vorteile gibt es die Anwendungsentwicklung im Low-Code-Konzept im Unternehmen selbst zu machen. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/fuenf-gruende-fuer-low-code/EAS-MAG.digital
…
continue reading
Cyber-Angriffe können überall lauern. Gerade wenn es um sensible Kundendaten geht, können schon die scheinbar kleinsten Angriffe eine große verheerende Wirkung haben. Dabei bildet der Mensch selbst oft die größte Schwachstelle im System. Deswegen gibt es folgende Tipps im Umgang mit Kundendaten. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag…
…
continue reading
Künstliche Intelligenz (KI) revolutioniert die Übersetzungsbranche – und schafft zugleich neue Risiken. Schnell, effizient, global – doch wo sensible Daten im Spiel sind, wird Datenschutz zur unternehmerischen Pflicht. Unternehmen, die auf KI-gestützte Übersetzungen setzen, müssen Sicherheit ganzheitlich denken. Den ganzen Beitrag lesen Sie hier: h…
…
continue reading
Von Business-Intelligence-Lösungen profitieren nicht nur die Management-Ebene. Je mehr Entscheider gewinnbringend mit BI-Applikationen und kontextrelevanten Daten arbeiten, desto größer der Nutzen für das Unternehmen. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag.digital/5-kriterien-zur-auswahl-einer-enterprise-bi-plattform/…
…
continue reading
Für Marketing & Vertrieb im Sanitär- Heizungs- und Klima- Handwerk (SHK) sind eine Bandbreite an Produktvarianten und seitenstarke Preislisten Alltag. Die Hersteller und Händler sind gefordert, die Produktdaten in allen Kanälen technisch korrekt mit den Branchenstandards (Datanorm, GAEB, ARGE Neue Medien) zu halten. Damit Unternehmen dies effizient…
…
continue reading
Wenn es um die digitale Transformation in der öffentlichen Verwaltung geht, rückt Künstliche Intelligenz immer stärker in den Fokus. Initiativen und Förderprogramme zeigen, dass die Technologie als Schlüsselfaktor für die Modernisierung massiv an Bedeutung gewinnt – ein Umstand, der jedoch nicht nur Chancen, sondern auch dringenden Handlungsbedarf …
…
continue reading
Die Potenziale der Robotic Process Automation sind vielfältig und immens: Sie reichen von massiven Kosteneinsparungen und Produktivitätssteigerungen über höhere Mitarbeiterzufriedenheit und verbesserte Prozessqualität bis hin zur Abfederung des Fachkräftemangels. UiPath zeigt auf, welche Eigenschaften eine RPA-Plattform aufweisen muss, damit Untern…
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
Smarte Roboter erobern die Fabrik – Vier Beispiele für das Zusammenspiel von KI und Edge Computing
7:16
Die intelligente Fabrik ist längst Realität – und auch der „unwissende“ Roboter von einst gehört mehr und mehr der Vergangenheit an. Eine solche Fabrik zeichnet sich durch die Kombination verschiedener Technologien aus, die nahtlos ineinandergreifen. NTT DATA erklärt, welche Rolle KI und Edge Computing dabei spielen. Den ganzen Beitrag lesen Sie hi…
…
continue reading
CEOs und Geschäftsführer haben bisher die Konzeption von Schnittstellen (Englisch: Application Programming Interface, kurz: API) meist in die IT-Abteilung deligiert. Die digitale Transformation muss aber die Unternehmenslenker wach rütteln. Auch CEOs müssen sich mit dieser Thematik beschäftigen. Den ganzen Beitrag lesen Sie hier: https://de.eas-mag…
…
continue reading
eCommerce ist nicht nur im letzten Jahr stark gewachsen. Der Webshop-Trend boomt schon seit langer Zeit, und auch hier gilt: besser spät als nie! Unternehmen profitieren massiv von einem Shop auf ihrer Website. Solange dieser richtig erstellt sind und das Marketing den Onlineshop auch voll ausnutzt. Doch um online einen erfolgreichen Shop zu erstel…
…
continue reading
Mit dem stetigen Voranschreiten der digitalen Transformation in den letzten Jahren wurden Unternehmen zunehmend abhängig von zahlreichen Partnern und Lieferanten. Diese Verschiebung hat zu einer komplexeren IT-Infrastruktur geführt und signifikant die Angriffsfläche vergrößert, die Cyberkriminelle ausnutzen können. Sie haben es auf das schwächste G…
…
continue reading
In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Aaluxx Myth, co-founder of Maya Protocol, a decentralized liquidity solution enabling native L1-to-L1 token swaps. What you’ll learn: How Maya Protocol's approach to cross-chain liquidity differs from THORChain The real-world impact of crypto in Latin America How Prop 6…
…
continue reading
Künstliche Intelligenz (KI) entwickelt sich rasant weiter und übernimmt in vielen Bereichen bereits Aufgaben, die für den Menschen herausfordernd oder zeitaufwendig sind. Einige Systeme sind uns in bestimmten Aspekten sogar voraus – etwa bei der Datenanalyse oder Mustererkennung. Dennoch unterscheidet sich KI grundlegend vom menschlichen Gehirn, in…
…
continue reading
Dag Flachet joins us to discuss the concept of Kaizen and its application in improving application security. Dag shares his journey into the world of security, emphasizing the importance of iterative, small-step improvements. The conversation delves into how organizations can effectively implement maturity models to enhance their security programs,…
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Відтворити пізніше
Відтворити пізніше
Списки
Подобається
Подобається
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading