Computerworld - Deník pro IT profesionály
…
continue reading
Die Redaktion von ComputerBase diskutiert im CB-Funk ganz ohne Gebrüll aktuelle Themen und gewährt Einblicke hinter die Kulissen: Warum hat die Redaktion wie berichtet oder getestet, was steht an, oder wo klemmt es? Wer sich schon immer gefragt hat, wie es in den Köpfen hinter ComputerBase tickt, ist hier genau richtig. Feedback, Vorschläge und Wünsche zum Podcast sind jederzeit gerne gesehen.
…
continue reading
The Computer Game Show is a weekly podcast about computer games, hosted by David Turner, Sean Bell, Mat Murray and James Farley. Listen every Wednesday on Apple Podcasts, Google Podcasts, Spotify and YouTube. Email podcast@tcgs.co or visit tcgs.co to stream every episode, watch our Twitch streams, contact the show and more. Get exclusive content and more by supporting TCGS on Patreon at patreon.com/tcgs
…
continue reading
Welkom in Computer Club, een podcast door Frederik 'Freddy' De Bosschere en Thomas 'Smollie' Smolders! Wekelijks bespreken we de actualiteit op vlak van technologie en gaan we op zoek naar interessante feiten en innovaties. Er zijn ook jingles.
…
continue reading
Jeden Samstag das Neueste aus Computertechnik und Informationstechnologie. Beiträge, Reportagen und Interviews zu IT-Sicherheit, Informatik, Datenschutz, Smartphones, Cloud-Computing und IT-Politik. Die Trends der IT kompakt und informativ.
…
continue reading
"Compute This!" with Thor Schrock airs Sundays from 7-8 a.m. on NewsRadio 1110 KFAB-AM.
…
continue reading
Computers 2K Now - Computers and Technology Call-in Webcast
…
continue reading
Computerlaw Group LLP (www.computerlaw.com) provides strategic, knowledgeable, and effective business and intellectual property protection, licensing and litigation services to Internet, e-commerce, computer software, hardware and other high-tech businesses, teams and industry professionals throughout California, nationally and around the world. CLG produces THE VALLEY CURRENT as a way to keep its worldwide clients, co-counsels, colleagues, and friends aware of developments in Silicon Valley ...
…
continue reading
In de podcast Computeren nemen chronisch online journalisten Samya Hafsaoui, Marieke Kuypers en Timo Harmelink je wekelijks mee door de diepste krochten van het internet. We praten je bij over de memes, drama’s, en discussies die je móét kennen om online mee te kunnen. Want nu we allemaal steeds meer in de digitale wereld leven: wat doet dat eigenlijk met hoe we de echte wereld zien? We maken Computeren vanaf nu geheel onafhankelijk, met behulp van Spraakmaker Media. Dus deel deze podcast me ...
…
continue reading
Covering the entire Star Trek franchise in chronological order.
…
continue reading
Computer America is the nation's longest running talk show on Computers and Technology, spanning 25+ years of industry guests and analysis.
…
continue reading
A show about our lives online. default.blog
…
continue reading
With Hosts Hank Kee and Joe King
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
True stories that showcase how Cowabunga Computers is making a difference for the businesses and residents of Hawaii.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
The Computer Corner Radio Show with Gene Mitchell and Joe Myshko is on the air every Saturday morning from 8:00AM to 9:30AM. The Computer Corner show now airs on WCHE 1520. The show formerly aired on WCOJ 1420 in Chester County, PA. The Show is celebrating over 14 years.
…
continue reading
Audio files of our weekly radio show on WDBO where we talk about your electronic life. Help and advice are given on a range of technical issues from computers to everything internet-related.
…
continue reading
Neue Produkte und Trends aus Computertechnik und Telekommunikation: Was bringen uns die neuen Technologien? Was gibt es Spannendes im Netz? Eine Orientierung im Dschungel der Bits und Bytes. "Das Computermagazin" - Ein gemeinsames Magazin der Redaktionen Wissenschaft, Wirtschaft und Zündfunk.
…
continue reading
Computer Talk Radio is a nationally syndicated broadcast radio program on computers and technology, and how they impact your life. Benjamin Rockwell, the show host and a computer nerd, leads the team as the expert guide through the technical jungle of jargon, and the valleys of viruses, to reach the pinnacle of power over your computer problems. Benjamin is joined by multiple team members who thrive on bringing you to the next level of knowledge. Keith M. Sedor has been a Certified Apple Mac ...
…
continue reading
Since 1995, Computer Talk with TAB has been on the air live each week providing an in-depth practical view of computers and their place in our everyday lives. A Computer Radio Program for everyone! Erik Semmel from TAB Computer Systems hosts the show and provides real time answers to caller’s questions. To keep the topics fresh and informative, guests are brought in as a result of listener’s questions and suggestions. The show is geared towards the everyday computer user with questions about ...
…
continue reading
A journey through many years (and occasionally centuries) to find out who is responsible for modern computer and video games. May contain balls, Napoleon Bonaparte, robots, organized crime, and the US Air Force.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Technology is changing fast. And it's changing our world even faster. Host Alix Dunn interviews visionaries, researchers, and technologists working in the public interest to help you keep up. Step outside the hype and explore the possibilities, problems, and politics of technology. We publish weekly.
…
continue reading
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: marcandmarsha@Gmail.Com Twitter #techradio @MarshaCollier & @realmarccohen
…
continue reading
Each week our tricked-out team of tech investors and former operators breakdown the biggest headlines and themes in both public and private markets, with a specific focus on how AI is changing the tech landscape. We will be joined by some of the most influential voices in tech, media, and crypto leaving listeners with fresh perspectives on increasingly complicated topics impacting their lives and investment portfolios. Okay, Computer. Podcast is hosted by Dan Nathan, with regular contributor ...
…
continue reading
podformation ist die Podcast-Plattform der medien-informationsdienst Rolandseck GmbH. Die Spezial-Agentur für Audio-Kommunikation bietet im Podcast 'podformation' Infos und Tipps für den Verbraucher.
…
continue reading
Faculty and students from the South East Technology University (SETU) Ireland explore a wide range of topics related to computing and technology. Hosted by Rob O'Connor. All opinions are personal and do not represent University views.
…
continue reading
Computertalk with Larry Piland
…
continue reading
school uniforms Cover art photo provided by David Pennington on Unsplash: https://unsplash.com/@dtpennington
…
continue reading
1
DRUM AND BASS | Computers LIVE | BREAKCORE DNB IDM | Neurofunk Jump Up Techstep | FUTURE LOFI DNB | Reaktor Live Looping | VAPORWAVE AI | Electronic Music | MIDTEMPO | Ghostwriter Los Angeles
Computers LIVE
Computers LIVE is a Drum and Bass Podcast made by AI. The show streams weekly and new episodes are posted monthly. Neurofunk Drum and Bass Music that you won't find anywhere else. Computers LIVE features exclusive releases of Neurofunk, Drum and Bass, Breakcore, Vaporwave, Dubstep, Trap, IDM, DNB, EDM and LO-FI. Shows are streamed here https://www.youtube.com/@computermusiclive/streams & https://www.facebook.com/computerslive and donations can be made here https://www.paypal.me/AKB48
…
continue reading
En este podcast diario comentaba el resumen tecnológico de las últimas 24 horas, para que los oyentes pudieran empezar el día estando al tanto de lo último en tecnología. El podcast sigue en la red de ComputerHoy.com.
…
continue reading
Celebrating innovation in a world of virtually unlimited compute power, one story at a time.
…
continue reading
The latest podcast feed searching 'Computers' on SermonAudio.
…
continue reading
…
continue reading
1
humans+computers
Humans + Computers is a collaboration between Chinatown, NY based studios Human NYC and Sanctuary Computer.
…
continue reading
Start and Grow a Computer Business
…
continue reading
…
continue reading
Junior infant maths Cover art photo provided by Ricardo Gomez Angel on Unsplash: https://unsplash.com/@ripato
…
continue reading
Nick Xander Harris Nathan Alister
…
continue reading
Podcast by Elementary Computer
…
continue reading
Technology And Life
…
continue reading
We're increasingly dependent on technology. Our business and personal lives rely on it, but as you've probably noticed, it's unreliable.They promise it'll get better, but it usually gets worse. Our computers are slow, so we end up squinting at smartphones. We live in constant fear that something's going to happen to our personal data. So we're scared into paying for fake protection that proves useless when disaster strikes. The jokers we pay to fix our stuff have no clue what they're doing, ...
…
continue reading
بقلم NewsRadio 1110 KFAB (KFAB-AM)
…
continue reading
1
#91 Einblicke in die Entwicklung von Pioneers of Pagonia
1:01:12
1:01:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:01:12
Fabian und Jan im Interview mit Dirk Ringe Alle Inhalte zu Pioneers of Pagonia auf ComputerBasehttps://www.computerbase.de/news/pioneers-of-pagonia/ Die Webseite zum Spielhttps://www.pioneersofpagonia.com/ Pioneers of Pagiona auf Steam (Early Access)https://store.steampowered.com/app/2155180/Pioneers_of_Pagonia/…
…
continue reading
1
Network Fingerprinting for Securing User Accounts - Opportunities and Challenges (god2024)
25:00
25:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:00
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
1
Network Fingerprinting for Securing User Accounts - Opportunities and Challenges (god2024)
25:00
25:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:00
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
1
Network Fingerprinting for Securing User Accounts - Opportunities and Challenges (god2024)
25:00
25:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
25:00
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
1
The Debian OpenSSL bug and other Public Private Keys (god2024)
21:50
21:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:50
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
1
The Debian OpenSSL bug and other Public Private Keys (god2024)
21:50
21:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:50
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
1
The Debian OpenSSL bug and other Public Private Keys (god2024)
21:50
21:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:50
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
1
The Debian OpenSSL bug and other Public Private Keys (god2024)
21:50
21:50
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:50
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
V současné době se výzkumníci snaží o vývoj kvantových datových center, které bude možné využít v praxi – se současnou technologií je prý už reálné vybudovat síť menších kvantových počítačů.بقلم redakce@computerworld.cz (Computerworld: Pavel Louda)
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
1
GenAI in the Battle of Security: Attacks, Defenses, and the Laws Shaping AI's Future (god2024)
28:56
28:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:56
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
…
continue reading
1
GenAI in the Battle of Security: Attacks, Defenses, and the Laws Shaping AI's Future (god2024)
28:56
28:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:56
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
…
continue reading
1
GenAI in the Battle of Security: Attacks, Defenses, and the Laws Shaping AI's Future (god2024)
28:56
28:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:56
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
…
continue reading
1
GenAI in the Battle of Security: Attacks, Defenses, and the Laws Shaping AI's Future (god2024)
28:56
28:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:56
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
…
continue reading
1
Overview of OWASP AI Exchange: A Comprehensive Guide to AI Security (god2024)
21:46
21:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:46
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
…
continue reading
1
Overview of OWASP AI Exchange: A Comprehensive Guide to AI Security (god2024)
21:46
21:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:46
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
…
continue reading
1
Overview of OWASP AI Exchange: A Comprehensive Guide to AI Security (god2024)
21:46
21:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:46
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
…
continue reading
1
Overview of OWASP AI Exchange: A Comprehensive Guide to AI Security (god2024)
21:46
21:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:46
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
…
continue reading
1
NIS2 entmystifiziert - Was Unternehmen nun tun müssen (god2024)
23:14
23:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:14
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
…
continue reading
1
NIS2 entmystifiziert - Was Unternehmen nun tun müssen (god2024)
23:14
23:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:14
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
…
continue reading
1
NIS2 entmystifiziert - Was Unternehmen nun tun müssen (god2024)
23:14
23:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:14
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
…
continue reading
1
NIS2 entmystifiziert - Was Unternehmen nun tun müssen (god2024)
23:14
23:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:14
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
…
continue reading
1
The Crucial Role of Web Protocols and Standards in Digital Wallet Ecosystems (god2024)
31:29
31:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:29
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
…
continue reading
1
The Crucial Role of Web Protocols and Standards in Digital Wallet Ecosystems (god2024)
31:29
31:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:29
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
…
continue reading
1
The Crucial Role of Web Protocols and Standards in Digital Wallet Ecosystems (god2024)
31:29
31:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:29
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
…
continue reading
1
The Crucial Role of Web Protocols and Standards in Digital Wallet Ecosystems (god2024)
31:29
31:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:29
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
…
continue reading
1
Tech Investing 101: Insights From Imran Khan's Prolific Career
59:02
59:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
59:02
Dan Nathan and Guy Adami provide an update on the past week in tech as investors digest what the regulatory environment will look like under a second Trump administration. From the rotation into software to Chinese internet names, the duo breaks it all down. Dan then welcomes Imran Khan (12:00), founder and CEO of Proem Asset Management, to discuss…
…
continue reading
1
How (Not) to Use OAuth in 2024 (god2024)
36:48
36:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:48
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
…
continue reading
1
How (Not) to Use OAuth in 2024 (god2024)
36:48
36:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:48
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
…
continue reading
1
How (Not) to Use OAuth in 2024 (god2024)
36:48
36:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:48
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
…
continue reading
1
How (Not) to Use OAuth in 2024 (god2024)
36:48
36:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
36:48
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
…
continue reading
1
OWASP Juice Shop 10th anniversary: Is it still fresh? (god2024)
31:59
31:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:59
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
…
continue reading
1
OWASP Juice Shop 10th anniversary: Is it still fresh? (god2024)
31:59
31:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:59
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
…
continue reading
1
OWASP Juice Shop 10th anniversary: Is it still fresh? (god2024)
31:59
31:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:59
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
…
continue reading
1
OWASP Juice Shop 10th anniversary: Is it still fresh? (god2024)
31:59
31:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:59
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deبقلم OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deبقلم OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deبقلم OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deبقلم OWASP German Chapter
…
continue reading
This week: Nintendo confirms backwards compatibility on Switch 2, Nintendo sues streamer who said he could broadcast its pirated games "all day", PS5 Pro price has not had a "negative impact" on sales, Trump tariffs will make video game consoles up to 40% more expensive, and a Mass Effect TV series is in development at Amazon. Also: questions we’ve…
…
continue reading
Každá výrobní firma disponuje poměrně velkým majetkem. Většina tohoto majetku vyžaduje péči, aby se zhodnocoval, aby byl funkční a aby přinášel potřebnou přidanou hodnotu. Tuto péči má zpravidla na starosti oddělení údržby, které obsahuje specialisty na elektroopravy, mechanické opravy, stavební a zahradnické práce apod.…
…
continue reading
Erik Semmel Vice President TAB Computer Systems joins Brian for Tech Tuesday. Topics this week are very AI heavy. Google, OpenAI to rely on news content from Legacy media to train AI. Should they be paying for the ability to use Legacy media to train the AI models?
…
continue reading
Viceprezident Intelu přiznal problémy procesoru Arrow Lake. Nápravu chce firma stihnout do konce roku.بقلم redakce@computerworld.cz (Computerworld: Mark Hachman)
…
continue reading
Copilot AI je nově součástí předplatného M365 Personal a Family v několika zemích včetně Austrálie, Malajsie a Nového Zélandu.بقلم redakce@computerworld.cz (Computerworld: Matthew Finnegan)
…
continue reading
Referenční architektury, jež mají výrazně urychlit a zjednodušit stavbu datových center orientovaných na využití umělou inteligenci, představila Nvidia, která je nejvýznamnějším dodavatelem vysoce výkonných výpočetních systémů pro AI.بقلم redakce@computerworld.cz (Computerworld: Pavel Louda)
…
continue reading
1
Mají pevné disky budoucnost? Western Digital nastavuje nové standardy pro kapacitu a hustotu úložišť
Nové, vysoce kapacitní pevné disky v produktových řadách Ultrastar a WD Gold od společnosti Western Digital využívají jako první na světě 11plotnovou platformu u architektury pevného disku.بقلم redakce@computerworld.cz (Computerworld: Partnerský článek)
…
continue reading