Podcasts about Noun

Part of speech

  • 1,019PODCASTS
  • 2,065EPISODES
  • 25mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Sep 2, 2025LATEST
Noun

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Noun

Show all podcasts related to noun

Latest podcast episodes about Noun

Hacking Humans
DevOps (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Sep 2, 2025 7:30


Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠ Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.

Word Notes
DevOps (noun)

Word Notes

Play Episode Listen Later Sep 2, 2025 7:30


Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠ Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacking Humans
Waterfall Software Development Method (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Aug 26, 2025 6:25


Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠ Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015

Word Notes
Waterfall Software Development Method (noun)

Word Notes

Play Episode Listen Later Aug 26, 2025 6:25


Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠ Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015 Learn more about your ad choices. Visit megaphone.fm/adchoices

Hacking Humans
Agile Software Development Method (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Aug 19, 2025 7:45


Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/agile-software-development⁠ Audio reference link: "⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.

ML Sports Platter
Calvary Club Superintendent Jeff Moesch/TK 99's Gomez/Golf Legend Perry Noun.

ML Sports Platter

Play Episode Listen Later Aug 19, 2025 8:40


00:00-15:00 ML chats Calvary Club taking the next step, Scottie Scheffler rolling with another win and signature shot, new technology hitting Calvary, a hard but good golf year in CNY with weather, Syracuse football naming a QB, a hard Orange schedule and more with Jeff Moesch from Calvary Club, Gomez Adams from TK 99, Joe Jr. and golf legend Perry Noun. Presented by CH Insurance.

Word Notes
Agile Software Development Method (noun)

Word Notes

Play Episode Listen Later Aug 19, 2025 7:45


Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/agile-software-development⁠ Audio reference link: "⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices

La Hora Extra
La Hora Extra | Autoras que desmontan Disney: "la vida es gore, no un cuento de hadas"

La Hora Extra

Play Episode Listen Later Aug 17, 2025 38:36


'Los templos solemnes', de Glòria de Castro, es una búsqueda de la belleza en la cruel naturaleza. 'Suya era la noche', de María Ovelar, una búsqueda del deseo lejos del amor romántico y entre relaciones tóxicas

Hacking Humans
Pegasus (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Aug 12, 2025 8:45


Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠ Audio reference link:⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022

Word Notes
Pegasus (noun)

Word Notes

Play Episode Listen Later Aug 12, 2025 8:45


Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠ Audio reference link:⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022 Learn more about your ad choices. Visit megaphone.fm/adchoices

志賀十五の壺【言語学ラジオ】
#780 アフリカのバントゥー諸語の Noun class from Radiotalk

志賀十五の壺【言語学ラジオ】

Play Episode Listen Later Aug 9, 2025 11:40


関連エピソード https://radiotalk.jp/talk/979018 https://radiotalk.jp/talk/980489 おたより▶︎https://bit.ly/33brsWk X▶︎https://x.com/sigajugo オリジナルグッズ▶︎https://suzuri.jp/sigajugo Instagram▶︎https://www.instagram.com/sigajugo/ LINEオープンチャット▶︎https://bit.ly/3rzB6eJ note▶︎https://note.com/sigajugo BGM・効果音: MusMus▶︎http://musmus.main.jp/ #落ち着きある #ひとり語り #豆知識 #雑学 #教育

Japanese with Kanako
#3-25 Japanese Shadowing “towards/against/in contrast with” | 日本語でシャドーイング「~に対して・に対し・に対するNoun」

Japanese with Kanako

Play Episode Listen Later Aug 6, 2025 9:29


TRY N3 Textbook P45, 46 ▼Buy me a coffee and Be a sponsor of one episode ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/KANAKO-Coffee⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠▼BGM ⇒ DOVA-SYNDROME(⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://dova-s.jp/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠)▼Ending BGM ⇒Flower Field【FLASH☆BEAT】

Hacking Humans
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Aug 5, 2025 8:27


Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠ Audio reference link:"⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠" “Global Cyber Alliance's Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018

Word Notes
Domain-based Message Authentication Reporting Conformance (DMARC) (noun)

Word Notes

Play Episode Listen Later Aug 5, 2025 8:27


Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠ Audio reference link:"⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠" “Global Cyber Alliance's Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018 Learn more about your ad choices. Visit megaphone.fm/adchoices

Can't Beat Kylie
That's a Noun, Not a Name

Can't Beat Kylie

Play Episode Listen Later Aug 1, 2025 72:00


See omnystudio.com/listener for privacy information.

Japanese with Kanako
#3-4 Japanese Shadowing “~というNoun” | 日本語でシャドーイング「~という名詞」

Japanese with Kanako

Play Episode Listen Later Jul 30, 2025 9:36


TRY N3 Textbook P18 ▼Buy me a coffee and Be a sponsor of one episode ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/KANAKO-Coffee⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠▼BGM ⇒ DOVA-SYNDROME(⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://dova-s.jp/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠)▼Ending BGM ⇒Flower Field【FLASH☆BEAT】

Hacking Humans
Shields Up (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jul 29, 2025 7:46


Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossary/shields-up⁠⁠ Audio reference link: “⁠⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠⁠” YouTube, YouTube, 11 Apr. 2015,  

Word Notes
Shields Up (noun)

Word Notes

Play Episode Listen Later Jul 29, 2025 7:46


Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/shields-up⁠ Audio reference link: “⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠” YouTube, YouTube, 11 Apr. 2015,   Learn more about your ad choices. Visit megaphone.fm/adchoices

All Ears English Podcast
AEE 2450: Grammar That Breaks the Rules Part 2: Noun Nonsense

All Ears English Podcast

Play Episode Listen Later Jul 28, 2025 19:24


Learn more about your ad choices. Visit podcastchoices.com/adchoices

All Ears English Podcast
AEE 2450: Grammar That Breaks the Rules Part 2: Noun Nonsense

All Ears English Podcast

Play Episode Listen Later Jul 28, 2025 19:24


Take our free English-level quiz here to find out what your current English level is.  Do you love All Ears English?  Try our other podcasts here: Business English Podcast: Improve your Business English with 3 episodes per week, featuring Lindsay, Michelle, and Aubrey IELTS Energy Podcast: Learn IELTS from a former Examiner and achieve your Band 7 or higher, featuring Jessica Beck and Aubrey Carter Visit our website here or https://lnk.to/website-sn If you love this podcast, hit the follow button now so that you don't miss five fresh and fun episodes every single week.  Don't forget to leave us a review wherever you listen to the show. Send your English question or episode topic idea to support@allearsenglish.com Learn more about your ad choices. Visit podcastchoices.com/adchoices

Hacking Humans
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jul 22, 2025 5:43


Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization's specific risks. Audio reference link: "⁠⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠⁠." by Pravir Chandra, OWASP MSP, 2009.

Word Notes
Software Assurance Maturity Model (SAMM) (noun)

Word Notes

Play Episode Listen Later Jul 22, 2025 5:43


Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization's specific risks. Audio reference link: "⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠." by Pravir Chandra, OWASP MSP, 2009. Learn more about your ad choices. Visit megaphone.fm/adchoices

Mañanas BLU con Néstor Morales
“A Petro lo conocí siendo un demócrata, no un autoritario”: senador Lidio García sobre reelección

Mañanas BLU con Néstor Morales

Play Episode Listen Later Jul 22, 2025 14:54


See omnystudio.com/listener for privacy information.

Japanese with Kanako
#2-67 Japanese Shadowing “Action like Noun A” | 日本語でシャドーイング「Noun Aのように」

Japanese with Kanako

Play Episode Listen Later Jul 20, 2025 9:31


GENKI 2 Japanese Textbook P239 (Edition 2) / P237 (Edition 3)  ▼Buy me a coffee and Be a sponsor of one episode ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/KANAKO-Coffee⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠▼BGM ⇒ DOVA-SYNDROME(⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://dova-s.jp/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠)▼Ending BGM ⇒Flower Field【FLASH☆BEAT】

Japanese with Kanako
#2-66 Japanese Shadowing “Noun B like Noun A” | 日本語でシャドーイング「Noun AのようなNoun B」

Japanese with Kanako

Play Episode Listen Later Jul 19, 2025 10:14


GENKI 2 Japanese Textbook P239 (Edition 2) / P237 (Edition 3)  ▼Buy me a coffee and Be a sponsor of one episode ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/KANAKO-Coffee⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠▼BGM ⇒ DOVA-SYNDROME(⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://dova-s.jp/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠)▼Ending BGM ⇒Flower Field【FLASH☆BEAT】

Parler anglais
Guess the Missing Uncountable Noun

Parler anglais

Play Episode Listen Later Jul 16, 2025 9:17


Complete Ben's story with 10 uncountable nouns.Patreon: patreon.com/learnenglishwithben - For transcripts, comprehension quizzes, and video tutorials, join the fan club.Buy Me A Coffee: https://buymeacoffee.com/learnenglishwithbenInstagram: instagram.com/learnenglishwithbenWebsite: learnenglishwithben.comEmail: learnenglishwithben88@gmail.com - send me an email if you're interested in classes Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.

Hacking Humans
Universal 2nd Factor (U2F) (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jul 15, 2025 6:17


Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: ⁠⁠https://thecyberwire.com/glossary/u2f⁠⁠ Audio reference link: “⁠⁠Rise of the Machines: A Cybernetic History⁠⁠,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.

Word Notes
Universal 2nd Factor (U2F) (noun)

Word Notes

Play Episode Listen Later Jul 15, 2025 7:17


Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: ⁠https://thecyberwire.com/glossary/u2f⁠ Audio reference link: “⁠Rise of the Machines: A Cybernetic History⁠,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017. Learn more about your ad choices. Visit megaphone.fm/adchoices

Japanese with Kanako
#3-25 Japanese Shadowing “towards/against/in contrast with” | 日本語でシャドーイング「~に対して・に対し・に対するNoun」

Japanese with Kanako

Play Episode Listen Later Jul 11, 2025 9:29


TRY N3 Textbook P45, 46 ▼Buy me a coffee and Be a sponsor of one episode ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bit.ly/KANAKO-Coffee⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠▼BGM ⇒ DOVA-SYNDROME(⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://dova-s.jp/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠)▼Ending BGM ⇒Flower Field【FLASH☆BEAT】

Hacking Humans
adversary group naming (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jul 8, 2025 10:17


Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.

Word Notes
adversary group naming (noun)

Word Notes

Play Episode Listen Later Jul 8, 2025 10:17


Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. Learn more about your ad choices. Visit megaphone.fm/adchoices

Word Notes
BSIMM (noun)

Word Notes

Play Episode Listen Later Jul 1, 2025 6:09


Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠ Audio reference link: “⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠.” YouTube Video. YouTube, September 19, 2014. Learn more about your ad choices. Visit megaphone.fm/adchoices

Trifulca Wrestling Podcast
Karol G Tropicoqueta “Fue Si o No Un Album De Plagio” || REACCIÓN

Trifulca Wrestling Podcast

Play Episode Listen Later Jun 30, 2025 42:31


Trifulca Media Presenta:La Pandemia Urbana con Alex Torres y Omar Vázquez Rivera quienes se unen a Laura para hablar, analizar, y discutir sobre la nueva producción musical de la cantante colombiana Karol G. Sigan a Trifulca Media:Facebook - https://ppppppppppppppQ XS www.facebook.com/a TrifulcaMedia?mibextid=LQQJ4d .p opiokcÑInstagram - https://www.instagram.com/latrifulcamedia?igsh=MW1yNGE2NnY0N2pyYw==Threads - https://www.threads.net/@latrifulcamediaYouTube - https://youtube.com/@trifulcamedia?si=Spotify - https://open.spotify.com/show/2Nki4huLPMwYftru08gFYV?si=Z2AMDLjRSiOc2U_LVUXRpwApple Podcast - https://podcasts.apple.com/us/podcast/trifulca-media/id1459553025#lapandemiaurbana #karolg #tropicoqueta#colombia#generourbano #reggaeton #lapandemiaurbana #trifulcawrestlingpodcast #trifulcamedia

Hacking Humans
BSIMM (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jun 28, 2025 6:09


Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠ Audio reference link: “⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠.” YouTube Video. YouTube, September 19, 2014.

Hacking Humans
OWASP vulnerable and outdated components (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jun 24, 2025 8:04


Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version.  Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016

Word Notes
OWASP vulnerable and outdated components (noun)

Word Notes

Play Episode Listen Later Jun 24, 2025 8:04


Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version.  Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016 Learn more about your ad choices. Visit megaphone.fm/adchoices

The Culture We Deserve
Revolution and Ruin Book Club: George Sand's Indiana

The Culture We Deserve

Play Episode Listen Later Jun 19, 2025 107:31


Indiana is married to a brutish man who bullies and abuses her. She is followed around by her cousin Ralph, who loves her but remains a loyal friend to the man who stomps her on the face and kills her dog. Then there is Raymon, the scoundrel, who loves Indiana but is also sleeping with her maid Noun. It's a love pentagon, and somehow no one is having a very good time. George Sand's Indiana is a story about how women have adapted to and managed their lack of rights or ability to leave terrible husbands, but it's also a comedy about the impossibility of love under patriarchy. Join the book club discussion: http://theculturewedeserve.substack.com

Hacking Humans
OWASP software and data integrity failures (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jun 10, 2025 8:27


Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes.

Word Notes
OWASP software and data integrity failures (noun)

Word Notes

Play Episode Listen Later Jun 10, 2025 8:27


Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes. Learn more about your ad choices. Visit megaphone.fm/adchoices

Crossroads
Spring Forward: Communion

Crossroads

Play Episode Listen Later Jun 10, 2025 53:41


com·mun·ion /kəˈmyo͞onyən/ Noun   a Christian sacrament in which consecrated bread and wine are consumed as memorials of Christ's death.   the sharing or exchanging of intimate thoughts and feelings, especially when the exchange is on a mental or spiritual level   1 Corinthians 11:23-29   So what should we do as we take communion: Remember Embrace Examine   Crossroads – about heaven, earth, and the journey in between. Connect with us Website: www.crossroadsjourney.com YouTube: https://www.youtube.com/channel/UC17oxaQ1yWK2DgN0xnlMO_g Facebook: www.facebook.com/crossroadsjourney

The Jerry Jonestown Massacre
Show 630 – Epilogue

The Jerry Jonestown Massacre

Play Episode Listen Later Jun 6, 2025 36:23


Epilogue –  /?p??-lôg?, -l?g?/ – Noun 1. A short addition or concluding section at the end of a literary work, often dealing with the future of its characters.2. An event that reflects meaningfully on a recently ended conflict or struggle.3. The closing part of a discourse, in which the principal matters are recapitulated; a conclusion. […] The post Show 630 – Epilogue appeared first on The Jerry Jonestown Massacre.

epilogues noun jerry jonestown massacre
Por el Placer de Vivir con el Dr. Cesar Lozano
Cómo hacer de tu celular una mina de oro y no un distractor

Por el Placer de Vivir con el Dr. Cesar Lozano

Play Episode Listen Later Jun 3, 2025 25:14


¿Te cuesta estar concentrado y ves que no te rinde el tiempo? La experta en servicio al cliente, Yami Almaguer, nos explica cómo podemos aumentar nuestra productividad con una técnica denominada ‘Pomodoro'.¡Vivir en armonía y disfrutar el presente es encontrar el verdadero Placer de Vivir!Disfruta el podcast en Uforia App, Apple Podcasts, Spotify, ViX y el canal de YouTube de Uforia Podcasts, o donde sea que escuches tus podcasts. ¿Cómo te sentiste al escuchar este Episodio? Déjanos tus comentarios, suscríbete y cuéntanos cuáles otros temas te gustaría oír en #porelplacerdevivir 

The Working Genius Podcast with Patrick Lencioni
88. MBTI Is the Noun, Working Genius Is the Verb

The Working Genius Podcast with Patrick Lencioni

Play Episode Listen Later Jun 3, 2025 29:31


How can your understanding of Myers-Briggs add to your Working Genius? In episode 88 of the Working Genius Podcast, Pat and Cody dive into the relationship between Myers-Briggs Type Indicator (MBTI) and the Six Types of Working Genius. They explore how MBTI describes who you are (the noun), while Working Genius describes what you do best (the verb). Through examples and insights, they show how combining both tools can improve self-awareness, team collaboration, and career decisions.Topics explored in this episode: (00:40) Nouns vs. Verbs: The Core Difference* MBTI describes your personality preferences—the "noun" of who you are.* Working Genius identifies the activities you love—the "verb" of what you do.(04:30) A Crash Course in MBTI* The four MBTI dimensions: E/I, N/S, T/F, and J/P.* How these traits affect decision-making and communication.(7:31) No Overlap, But Total Alignment* Working Genius and MBTI have no direct correlation—and that's a strength.* Personal anecdotes show how people with the same MBTI have different Working Geniuses.* The pairing of both tools unlocks richer insight into how someone works and thrives.(18:59) Real Examples* Stories from The Table Group that contrast MBTI and Working Genius. .(24:46) Advanced Nuance and Practical Use* The concept of a "secondary MBTI type."This episode of The Working Genius Podcast with Patrick Lencioni is brought to you by The Table Group: https://www.tablegroup.com. We teach leaders how to make work more effective and less dysfunctional. We also help their employees be more fulfilled and less miserable. The Six Types of Working Genius model helps you discover your natural gifts and thrive in your work and life. When you're able to better understand the types of work that bring you more energy and fulfillment and avoid work that leads to frustration and failure, you can be more self-aware, more productive, and more successful. The Six Types of Working Genius assessment is the fastest and simplest way to discover your natural gifts and thrive at work: https://www.workinggenius.com/about/assessment Subscribe to The Working Genius Podcast on Apple Podcasts (https://apple.co/4iNz6Yn), Spotify (https://spoti.fi/4iGGm8u), and YouTube (https://bit.ly/Working-Genius-YouTube). Follow Pat Lencioni on https://www.linkedin.com/in/patrick-lencioni-orghealth and http://www.youtube.com/@PatrickLencioniOfficial. Connect with Cody Thompson https://www.linkedin.com/in/cody-thompson-a5918850. Be sure to check out our other podcast, At The Table with Patrick Lencioni, on Apple Podcasts (https://apple.co/4hJKKSL), Spotify (https://spoti.fi/4l1aop0), and YouTube (

Hacking Humans
OWASP server-side request forgery (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later Jun 3, 2025 7:38


Please enjoy this encore of Word Notes. An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. 

Word Notes
OWASP server-side request forgery (noun)

Word Notes

Play Episode Listen Later Jun 3, 2025 7:38


Please enjoy this encore of Word Notes. An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers.  Learn more about your ad choices. Visit megaphone.fm/adchoices

6AM Hoy por Hoy
La Corte debe citar a la Fiscal, debe ser contrapeso no un cómplice del gobierno: Exministro Henao

6AM Hoy por Hoy

Play Episode Listen Later Jun 3, 2025 7:44


El exministro de Vivienda Luis Felipe Henao expresó en  su profunda preocupación por la independencia de la Fiscalía General de la Nación frente al gobierno del presidente Gustavo Petro. 

Hacking Humans
OWASP security logging and monitoring failures (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later May 27, 2025 6:04


Please enjoy this encore of Word Notes. The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. 

Hacking Humans
OWASP identification and authentication failures (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later May 20, 2025 5:58


Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠ Audio reference link: “⁠Mr. Robot Hack - Password Cracking - Episode 1⁠.” YouTube Video. YouTube, September 21, 2016.

Hacking Humans
Log4j vulnerability (noun) [Word Notes]

Hacking Humans

Play Episode Listen Later May 13, 2025 9:16


Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/log4j⁠ Audio reference link: “⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious' She's Seen in Her Career⁠,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.