SQL Server Radio is a Podcast for SQL Server DBAs, database developers, architects, system administrators, and anyone else who is interested in the Microsoft SQL Server platform and the Microsoft data platform in general. As the data world changes, we also occasionally talk about other platforms and services like Azure and Amazon cloud services, Elastic Search, Hadoop, MongoDB, Machine Learning, and much more.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Hosted by Carlos L Chacon, the SQL Data Partners Podcast focuses on Microsoft data platform related topics mixed with a sprinkling of professional development. Carlos and guests discuss new and familiar features and ideas and how you might apply them in your environments. Visit our website for episode show notes at marathonus.com/podcast and leave a comment if you have a topic you think we should discuss. We’ll see YOU on the SQL Trail.
…
continue reading
SQL Down Under is a podcast for SQL Server and data professionals
…
continue reading
Kendra Little's podcast discussing database performance tuning, software development, and working with data.
…
continue reading
Podcast by John White & Jason Himmelstein
…
continue reading
Brought to you by Emergent Software, we talk about the latest news and tips in the software engineering and Microsoft world. Visit https://www.emergentsoftware.net/ to see how you can become more efficient and effective using the Microsoft Cloud.
…
continue reading
Knee-Deep In Tech is a weekly technology podcast covering IT and technology, focusing on the Microsoft stack. We are three MVPs and Microsoft Certified Trainers with between us over 40 years of IT infrastructure experience. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
Each episode Chris and Chris will be discussing topics and news from the world of SQL Server, while enjoying and chatting about beer! So, grab yourself a beer and tune in, cheers.
…
continue reading
Our podcast includes both technical & non-technical discussions on BigData, DataScience, BI, AI, DW, Business Intelligence, TDWI, SqlServer, SQL, NoSql, AWS, Azure, R, Python. Hosts: Rajib Bahar, Shabnam Khan
…
continue reading
A podcast where we explore everything in a modern (and not so modern) application stack. Join us as we talk about everything from modern TypeScript to old-school D.lang, Postgres to SQL Server, Heroku to AWS and everything in between, as we break down different apps, their stacks, and architectures.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Podcast giving the latest updates and information about the Rock RMS system. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
With more than 30 years of experience covering Microsoft, Directions on Microsoft provides unique perspectives about the shifts in Microsoft technologies, roadmaps and licensing policies that matter most to enterprise-size companies. Twice each month industry veteran Mary Jo Foley interviews a different Directions analyst for informed insights and advice to help you derive full value from your Microsoft investments.
…
continue reading
This podcast says you about the importance of self -belief Cover art photo by https://www.behance.net/raviroshan
…
continue reading
LearnKey, Inc., is a premier global provider of on-demand training solutions for corporate, education, government and personal users. View some tips from IT and business industry experts. Look for more great podcast soon.
…
continue reading
This is the show for IT leaders looking to move fast, optimize costs, and protect against the latest security threats in their IT environments. In each episode, discussions tackle one aspect of IT, from cloud computing and digital workplace to modern infrastructure and cybersecurity. If you're looking to stay ahead in the game, enhance your organizational agility, and secure your digital assets, you've come to the right place.
…
continue reading
Each episode, we bring in expert guests to discuss data-based technologies, business and the related market issues. We consider it "Business Technical," not too technical, but not too vanilla. We discuss what different technologies are, how they can be used and the best learning resources for you to get started. We'll be spending a lot of time on the Cloud's effect on IT as well as IT careers. We publish every two weeks, and we love feedback! Want to be a guest? Have an idea? I'd love to hea ...
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading

1
Episode 179 - SQL Server 2025 RC0 announced and weird latch timeouts
34:40
34:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:40Guy and Eitan discuss several interesting announcements and updates from Microsoft related to SQL Server and VS Code. And also Eitan talks about a weird issue he encountered involving page latch time-outs during DBCC CHECK command. Please fill out the SQL Server on Linux adoption survey here! Thank you! Relevant links: Higher log rate for business …
…
continue reading

1
SANS Stormcast Thursday, September 11th, 2025: BASE64 in DNS; Google Chrome, Ivantii and Sophos Patches; Apple Memory Integrity Feature
7:12
7:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:12BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these invalid characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google Chrome Update Google released an update for Google Chrome, addressing two vulnerabilities. One of the vulnerabilities is rated critical and…
…
continue reading

1
SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday;
8:25
8:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:25Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft rates 13 of the vulnerabilities are critical. https://isc.sans.edu/diary…
…
continue reading

1
Training for AI with Stephanie Donahue
40:34
40:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
40:34How do you get your organization trained up to use AI tools? Richard talks to Stephanie Donahue about her work implementing AI tools at Avanade and with Avanade's customers. Stephanie discusses how many workers are bringing their own AI tools, such as ChatGPT, to work and the risks that represent to the organization. Having an approved set of tools…
…
continue reading

1
SANS Stormcast Tuesday, September 9th, 2025: Major npm compromise; HTTP Request Signature
8:44
8:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:44Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydioq5swk2y https://github.com/orgs/community/discussions/172738 https://git…
…
continue reading

1
Episode 304 - Microsoft Fabric August 2025 Feature Summary
41:34
41:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
41:34This is episode 304 recorded on September 4th, 2025, where John & Jason talk the Microsoft Fabric August 2025 Feature Summary including a new Flat list view in Deployment pipelines, Bursting controls for Data Engineering workloads, new test capabilities for User Data Functions, the ability to server real-time predictions with ML model endpoints, se…
…
continue reading

1
Enterprise Copilot Adoption: Lessons from the Field
31:00
31:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:00PwC Principal James Farhat joins Directions analyst Barry Briggs and Mary Jo Foley to discuss early real-world wins and challenges around Microsoft 365 Copilot adoption.بقلم Mary Jo Foley
…
continue reading

1
SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches;
5:34
5:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:34From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing via JavaScript in SVG Files Virustotal uncovered a Colombian phishing campaign that takes advantage of JavaScript …
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption
8:18
8:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:18Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
…
continue reading

1
SANS Stormcast Thursday, September 4th, 2025: Dassault DELMIA Apriso Exploit Attempts; Android Updates; 1.1.1.1 Certificate Issued
6:22
6:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:22Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
…
continue reading

1
SANS Stormcast Wednesday, September 3rd, 2025: Sextortiion Analysis; Covert Channel DNS/ICMP; Azure AD Secret Theft; Official FreePBX Patches
5:29
5:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:29A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. https://isc.sans.edu/diary/A%20quick%20look%20at%20sextortion%20at%20scale%3A%201%2C900%20messages%20and%20205%20Bitcoin%20addresses%20spanning%2…
…
continue reading
Episode 1000! Richard Campbell invites Paul Thurrott to join him to celebrate the milestone episode and answer questions from listeners. From the creation of the podcast to the role of Windows in the modern world, the impact of ARM, Cloud, and many other technologies - all addressed in this super-sized episode. And yes, artificial intelligence is p…
…
continue reading

1
How to Use Web Components, Iframes, and Module Federation for Multi-Framework Apps - JSJ 689
1:17:58
1:17:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:17:58This week on JavaScript Jabber, we dive deep into the challenges and opportunities of mixing and matching frontend frameworks in modern applications. I’m joined by Dan Shapir, Steve Edwards, and our special guest Hadar Geva, CTO and co-founder of Myop.dev. Together, we explore how companies are tackling multi-framework environments, the role of web…
…
continue reading

1
SANS Stormcast Tuesday, September 2nd, 2025: pdf-parser Patch; Salesloft Compromise; Velociraptor Abuse; NeuVector Default Password
5:39
5:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:39pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Putting OAuth Tokens at Risk OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Works…
…
continue reading

1
Episode 303 - Interview with Mike Carlo from Power BI Tips
36:34
36:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:34This is episode 303 recorded on August 21st, 2025, where John & Jason talk to Mike Carlo from Power BI Tips.com about Power BI & Microsoft Fabric, how his company is doing Workloads in Fabric, a debate about Lakehouses vs Warehouses, the Power Designer & Entelexos tools, and other fun topics.For show notes please visit www.bifocal.show…
…
continue reading
In this episode Michael and Sarah talk to Russ Rogers from the Xbox team about gaming security in general and Xbox specifically. This is the first time we have covered the topic! There is also so much news, we really list all the announcements here! It's about 9 mins of security news! https://aka.ms/azsecpod…
…
continue reading

1
SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch
5:45
5:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:45Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePB…
…
continue reading

1
Ep. 12 – Timing Attacks & Mobile OAuth Hijack: When Microseconds and Misflows Betray You
14:09
14:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:09A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
…
continue reading

1
Why We’re Building the Front End Wrong (and How to Fix It) - JSJ 688
46:52
46:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
46:52In this episode of JavaScript Jabber, I sit down with Delaney Gilliland to dive into why most of us are building the front end wrong—and what a faster, leaner, and simpler alternative could look like. We explore his background in game development and military applications, which gave him a unique perspective on web performance and real-time data ch…
…
continue reading

1
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report
6:39
6:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:39Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
…
continue reading

1
Episode 302 - Power BI August 2025 Feature Summary
30:52
30:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:52This is episode 302 recorded on August 20th, 2025, where John & Jason talk the Power BI August 2025 Feature Summary including Copilot in Embedded Reports for SharePoint Online, edit your data model in the Power BI service, TMDL view enhancements, Semantic Model refresh templates with Fabric Data pipelines, and more.For show notes please visit www.b…
…
continue reading

1
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;
5:43
5:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:43Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
…
continue reading

1
Common Azure Mistakes with Scott Sauber
34:06
34:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:06What are common mistakes folks are making with their Azure tenant(s)? While at the Kansas City Developers Conference, Richard chatted with Scott Sauber to run down his top ten list of issues he checks on for all his customers using Azure. From tenant ownership to naming conventions, policies, identities, and cost controls - there are a lot of thing…
…
continue reading

1
Get Ready for Microsoft's Coming Licensing Changes
19:00
19:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:00Starting Nov. 1, Microsoft is dropping the programmatic discounts that were baked into its volume-licensing agreements. But price hikes are just one of the resulting fallouts for which enterprises need to prepare immediately, as Directions' lead negotiator Dean Bedwell details in this episode with Mary Jo Foley.…
…
continue reading

1
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln
5:01
5:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:01Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions
6:04
6:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:04The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
…
continue reading

1
Vibe Coding: Building Faster with AI-Powered Development - JSJ 687
1:11:29
1:11:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:11:29In this episode of JavaScript Jabber, we dive deep into the world of vibe coding—what it means, how it works in practice, and why it’s changing the way developers build software. I’m joined by Anthony Campolo, who shares his hands-on experience developing AutoShow, an app that automates podcast show notes, using AI-assisted workflows. We talk about…
…
continue reading

1
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;
6:52
6:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:52Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking
6:52
6:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:52Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
…
continue reading

1
Episode 301 - Interview with Andrew Connell & Julie Turner of Code.Deploy.GoLive
27:35
27:35
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:35This is episode 301 recorded on August 20th, 2025, where John & Jason talk with friends and fellow podcasters Andrew Connell & Julie Turner of the Code.Deploy.GoLive show about how this podcast is AC's fault in the first place, what they are doing with their new podcast, community, and general shenanigans to celebrate the BIFocal.show's 300th episo…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
Data Governance for AI with Martina Grom
38:43
38:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:43How do you secure your organization's data to let AI technologies work safely? Richard chats with Martina Grom about her experiences helping sysadmins responsibly bring the power of Microsoft M365 Copilot into their organizations. Martina discusses setting up security and monitoring with tools like Microsoft Purview, enabling visibility into where …
…
continue reading