POPULARITY
Categories
Data centers are popping up all over the place- even in sheds in the backyard!Read more about the project here ★ Support this podcast on Patreon ★
Curious about OAuth, MCP servers, and building cool ChatGPT apps? Hear from Max of Stytch as we dive deep, break down the tech, and build a Tamagotchi together! Drop your thoughts and share if you enjoyed it.https://codingcat.dev/podcast/how-oauth-mcp-and-the-openai-apps-sdk-power-the-next-generation-of-interactive-ai-experiences00:00 Meet Stytch & Max01:20 Consumer Identity07:04 Deep Dive OAuth09:37 MCP Explained17:59 Security Risks19:59 Next-Gen Apps24:37 Building Chatagotchi34:09 MCP Code Walkthrough51:52 Future Predictions53:02 Closing Thoughts
What are the highs and lows of waiting on tables? In this episode of the Food Chain Ruth Alexander speaks to restaurateurs from London, New York and Mumbai to find out about the inner workings of one of the hardest jobs in the business. Ruth hears from French celebrity Maitre d, Fred Siriex, Mumbai based restauranteur Gauri Devidayal and Michael Cecchi-Azzolina, the New York based author of Your Table Is Ready.Get ready to hear stories of the pressures, the pleasures and the pay, plus the moments when the tension all got too much. If you would like to get in touch with the show, please email: thefoodchain@bbc.co.ukImage: The torso of a waitress, carrying two plates of food, against a purple background. CREDIT: Maria Korneeva/Getty images
In this episode of Hands-On IT, host Landon Miles breaks down what MCP (Model Context Protocol) servers are, why they exist, and how they're transforming real-world IT automation.Before MCP, AI assistants struggled to interact with the tools, systems, and data IT teams rely on. With the rise of open-source MCP servers, models now have a standardized, permission-aware way to reach into infrastructure, pull context, and execute workflows safely.Landon also sits down with Henry Smith, who helped build the Automox MCP server prototype. Together, they explore:What MCP servers actually do and the problems they solveWhy the open-source model matters for IT teamsHow MCP provides a clean, consistent interface for tools and dataReal-world applications like report generation, patch policy creation, and audit log analysisHow Automox built its own MCP server using Fast MCPThe future of AI-driven IT operationsIf you're an IT admin, security engineer, or automation enthusiast, this episode provides a clear explanation and a practical look at MCP servers in action.Links: Automox MCP Blog: https://www.automox.com/blog/automox-mcpAutomox MCP Git Repo: https://github.com/AutomoxCommunity/automox-mcp
(Inspired by Ken Honda, Japan's "Money Guru")1. The Abundance MindsetScarcity Thinking: "I'll never have enough." "Competition is fierce." Fear of loss dominates decisions.Zen Shift: Money flows like water—there's enough for everyone. Focus on serving, not taking. Example: A baker who worries about "selling out" vs. one who joyfully feeds the neighborhood. Action: Each morning, declare: "I am a magnet for opportunities."2. Heal Your Money WoundsChildhood Traumas: "Money is evil." "Rich people are greedy." Guilt over spending or earning.Zen Healing: Forgive past mistakes (e.g., debt, bad investments). Write a letter to your younger self: "You did your best." Reframe beliefs: "Money is energy for good." Action: Identify one money memory that hurts—meditate on releasing it.3. Discover Your GiftsForced Labor vs. Flow: "I work for a paycheck." → Exhaustion. "I work from joy." → Wealth follows.Zen Path: What would you do for free? That's your gift. Example: Ken Honda's mentor gave free gold coins—his generosity multiplied his wealth. Action: Spend 1 hour/week on a passion project without monetizing it.4. Trust Life 100%95% Trust = Fear in Disguise "What if I fail?" "I need a backup plan."Zen Surrender: Certainty is an illusion. The richest people bet on themselves without guarantees. Action: When anxious, whisper: "I trust the universe's plan."5. The "Thank You" TransformationGratitude Alchemy: Say "thank you" 3,000x/day (to bills, challenges, even mistakes). Why? Gratitude rewires your brain to spot abundance. My Story: After a paralyzing accident, "Thank you, God" helped me walk again.Action: Carry a "gratitude rock"—touch it and say "thank you" hourly.The Ultimate Zen Money Secret"Forget Money. Focus on Service." Money chasers lose. Servers win. Example: A chef obsessed with Michelin stars burns out. One who cooks to nourish thrives. Ken's Mentor: Gave free books/coins—his wealth grew because he detached.Try This: For 1 week, don't check your bank balance. Instead, track how many people you helped.Final ThoughtMoney is a game, but Zen is the rulebook. Play with joy, serve with love, and wealth becomes a side effect of your peace.Your Turn: Which principle will you practice today? My Video: 5 Zen Money Principles That Made Me a Millionaire https://youtu.be/IkOZ_86BbSkMy Audio: https://divinesuccess.net/wp-content/uploads/2021/Podcast5/5-Zen-Money-Principles-That-Made-Me-a-Millionaire.mp3
If you're building, testing, or using AI agents and services, how can you get network visibility into, and ensure performance of, these tools? On today's Tech Bytes podcast, we talk with sponsor Cisco ThousandEyes about how to monitor and measure performance of AI agents, AI models and services, and Model Context Protocol servers. We'll get... Read more »
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
If you're building, testing, or using AI agents and services, how can you get network visibility into, and ensure performance of, these tools? On today's Tech Bytes podcast, we talk with sponsor Cisco ThousandEyes about how to monitor and measure performance of AI agents, AI models and services, and Model Context Protocol servers. We'll get... Read more »
www.TheMasonAndFriendsShow.com https://thejuunit.bandcamp.com/releases https://www.youtube.com/@SuperStationWJDL-TV5 A Ridiculous Fever Dream of Pro Wrestling Presented by J Dub https://www.glass-flo.com Great Pipes for Sure Aliens? BBq? Tobasco only in Conjunction, coleslaw, Mike and high school football? tough to deal with folks, difficult, times with dummies, few answers needed, in stock,? same questions? did Urkel marry Laura? standardized system, robot Mike Job? robot Ju Job? Lisa Gambling Now? space needed, Servers, Fight Club End, Ridiculous, used oil? Refined Oil? Recycled oil? handling folks, work tasks, codlin these kids, Louve Code, passwords? single level, encryptions? crown on ? night time robberies.? the music of this episode@ https://open.spotify.com/playlist/2vgnoXCFFjzLLsFawpZqI0?si=fb2d5cfcfc934bac support the show@ www.patreon.com/MperfectEntertainment
Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vulnerability in the Monsta FTP web-based file management tool. The Landfall espionage campaign targets Samsung Galaxy devices in the Middle East. Five Eyes partners fret eroding cooperation on counterintelligence and counterterrorism. Israeli spyware maker NSO Group names the former U.S. ambassador to Israel as its new executive chairman. Monday Biz Roundup. Tim Starks from CyberScoop discusses uncertainty in the federal Cyber Corp program, The friendly face of digital villainy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop discussing uncertainty in the federal Cyber Corp program. Selected Reading Cyber information sharing law would get extension under shutdown deal bill (CyberScoop) Don't call it Cyber Command 2.0: Master plan for digital forces will take years to implement (The Record) North Korean hackers hijack Google, KakaoTalk accounts to control South Korean phones: Report (The Straits Times) EU set to water down landmark AI act after Big Tech pressure (The Financial Times) Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover (Hackread) Newly identified Android spyware appears to be from a commercial vendor (The Record) F.B.I. Director Is Said to Have Made a Pledge to Head of MI5, Then Broken It (The New York Times) Seeking to get off US blacklist, spyware firm NSO taps ex-envoy Friedman as chairman (The Times of Israel) Google's Wiz acquisition clears DOJ's antitrust review. (The Cyberwire) Tank interview: A hacking kingpin reveals all to the BBC (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Talk Python To Me - Python conversations for passionate developers
Today we're digging into the Model Context Protocol, or MCP. Think LSP for AI: build a small Python service once and your tools and data show up across editors and agents like VS Code, Claude Code, and more. My guest, Den Delimarsky from Microsoft, helps build this space and will keep us honest about what's solid versus what's just shiny. We'll keep it practical: transports that actually work, guardrails you can trust, and a tiny server you could ship this week. By the end, you'll have a clear mental model and a path to plug Python into the internet of agents. Episode sponsors Sentry AI Monitoring, Code TALKPYTHON NordStellar Talk Python Courses Links from the show Den Delimarsky: den.dev Agentic AI Programming for Python Course: training.talkpython.fm Model Context Protocol: modelcontextprotocol.io Model Context Protocol Specification (2025-03-26): modelcontextprotocol.io MCP Python Package (PyPI): pypi.org Awesome MCP Servers (punkpeye) GitHub Repo: github.com Visual Studio Code Docs: Copilot MCP Servers: code.visualstudio.com GitHub MCP Server (GitHub repo): github.com GitHub Blog: Meet the GitHub MCP Registry: github.blog MultiViewer App: multiviewer.app GitHub Blog: Spec-driven development with AI (open source toolkit): github.blog Model Context Protocol Registry (GitHub): github.com mcp (GitHub organization): github.com Tailscale: tailscale.com Watch this episode on YouTube: youtube.com Episode #527 deep-dive: talkpython.fm/527 Episode transcripts: talkpython.fm Theme Song: Developer Rap
Legend of Elements is a 3D idle RPG from the LoM lineage. Core fantasy is “numbers go up,” delivered via auto-progress + layered upgrades, then monetized through stacked gachas and step offers. Ads exist but are effectively a decoy; there isn't even a “remove ads” pack. UA is ~98% Google (YouTube + AdWords) with AI/UGC and “fake gameplay” motifs.Systems & sinks (what actually drives playtime/spend)• Two gachas: character (spirits) and skill, with very low SSR rates; also ad-summon entries (“2 free summons for an ad”).• “Online chest”: ~5x/day random gacha ticks, granted every ~5 minutes online.• 3–4 battle passes active during launch window; heavy event stack and daily quests.• Notification-baiting tactic: tiny “free” rewards (e.g., 5 soft-currency) inside every shop/offer to create badge-clearing behavior and force shop opens.Monetization architecture (how money happens)• Ads are a decoy to lift IAP; no VIP/no-ads pack to sell the removal.• Primary pay drivers: gachas + step offers (offer ladders surfaced early/often).• Panel consensus: at ~$100K/day IAP scale, there's little incentive to optimize ads.UA mix & creatives (why it scales on Google)• ~98% of impressions from YouTube + AdWords; almost nothing elsewhere.• Creative pillars: AI faces/VO, UGC narratives, meme remakes, Genshin/Diablo-style “fake gameplay.”• Uses creator placements (e.g., known Supercell YouTubers featured as ad talent).Servers & competitive pressure (why shard)• Thousands of small shards opened continuously; servers “die,” then merge, resetting the race.• Keep leaderboards small so winning feels plausible; too many whales per shard depresses motivation.Get our MERCH NOW: 25gamers.com/shop--------------------------------------PVX Partners offers non-dilutive funding for game developers.Go to: https://pvxpartners.com/They can help you access the most effective form of growth capital once you have the metrics to back it.- Scale fast- Keep your shares- Drawdown only as needed- Have PvX take downside risk alongside you+ Work with a team entirely made up of ex-gaming operators and investorsFor an ever-growing number of game developers, this means that now is the perfect time to invest in monetizing direct-to-consumer at scale.Our sponsor FastSpring:Has delivered D2C at scale for over 20 yearsThey power top mobile publishers around the worldLaunch a new webstore, replace an existing D2C vendor, or add a redundant D2C vendor at fastspring.gg.With Playablemaker, you can finally create playable and interactive adsNO-CODE + ON-BUDGET + LIGHTNING FASThttps://playablemaker.com/25gamersThis is no BS gaming podcast 2.5 gamers session. Sharing actionable insights, dropping knowledge from our day-to-day User Acquisition, Game Design, and Ad monetization jobs. We are definitely not discussing the latest industry news, but having so much fun! Let's not forget this is a 4 a.m. conference discussion vibe, so let's not take it too seriously.Panelists: Jakub Remiar, Felix Braberg, Matej LancaricJoin our slack channel here: https://join.slack.com/t/two-and-half-gamers/shared_invite/zt-2um8eguhf-c~H9idcxM271mnPzdWbipg00:00 intro00:48 Positioning & lineage04:40 Core loop & systems10:10 Monetization architecture14:40 Live-ops cadence18:00 UA strategy (98% Google)33:30 Creatives that convert41:20 Verdict & KPI checklistMatej LancaricUser Acquisition & Creatives Consultanthttps://lancaric.meFelix BrabergAd monetization consultanthttps://www.felixbraberg.comJakub RemiarGame design consultanthttps://www.linkedin.com/in/jakubremiarPlease share the podcast with your industry friends, dogs & cats. Especially cats! They love it!Hit the Subscribe button on YouTube, Spotify, and Apple!Please share feedback and comments - matej@lancaric.me
Welcome to the Tech Latest podcast. Every Tuesday, our tech experts Katey Creel and Shotaro Tani deliver the hottest trends and news from the sector.In this episode, Katey speaks with Seoul correspondent Kim Jaewon about Samsung's efforts to make up lost ground in the AI supply chain and innovation frontlines after falling behind to rivals. == == == == == == == ==Check out this episode's featured story below: Foxconn to deploy humanoid robots to make AI servers in US in months: CEO== == == == == == == ==And register for our weekly #techAsia newsletter here.Find more of our tech coverage here.And for the Asian business, politics, economy and tech stories others miss, please subscribe to Nikkei Asia here.Thanks for listening!
Ahold Delhaize overtreft de verwachting van analisten. De winst én omzet vallen in het derde kwartaal hoger uit. Het bedrijf gaat daarom (opnieuw) eigen aandelen inkopen. Voor 1 miljard euro. Ook investeert het supermarktbedrijf in AI. Deze aflevering hebben we het over die stap. Gaat het Ahold verder helpen? De marges verbeteren nu al, maar kunnen misschien nóg meer groeien. Hebben we het ook over de Amerikaanse shutdown. Dat is nu officieel de langste uit de Amerikaanse geschiedenis. Al 36 dagen zit de boel daar op slot en een einde is nog lang niet in zicht. Wij proberen te kijken wat dat betekent voor de Amerikaanse economie, voor de beurs en voor jou als belegger.Een shutdown die de beursgang van The Magnum Ice Cream Company in de war schopte. Die werd vertraagd, maar er kwam vandaag toch goed nieuws. Op 8 december gaat de ijsjestak alsnog naar de beurs van New York, Londen én Amsterdam! Kwartaalcijfers zijn er ook van Toyota, Novo Nordisk en Wolters Kluwer. We vertellen je waar je op moet letten. Waarom de cijfers van McDonalds zo goed zijn én over een Nederlands beursbedrijf dat mogelijk het Damrak gaat verlaten.See omnystudio.com/listener for privacy information.
Ahold Delhaize overtreft de verwachting van analisten. De winst én omzet vallen in het derde kwartaal hoger uit. Het bedrijf gaat daarom (opnieuw) eigen aandelen inkopen. Voor 1 miljard euro. Ook investeert het supermarktbedrijf in AI. Deze aflevering hebben we het over die stap. Gaat het Ahold verder helpen? De marges verbeteren nu al, maar kunnen misschien nóg meer groeien. Hebben we het ook over de Amerikaanse shutdown. Dat is nu officieel de langste uit de Amerikaanse geschiedenis. Al 36 dagen zit de boel daar op slot en een einde is nog lang niet in zicht. Wij proberen te kijken wat dat betekent voor de Amerikaanse economie, voor de beurs en voor jou als belegger.Een shutdown die de beursgang van The Magnum Ice Cream Company in de war schopte. Die werd vertraagd, maar er kwam vandaag toch goed nieuws. Op 8 december gaat de ijsjestak alsnog naar de beurs van New York, Londen én Amsterdam! Kwartaalcijfers zijn er ook van Toyota, Novo Nordisk en Wolters Kluwer. We vertellen je waar je op moet letten. Waarom de cijfers van McDonalds zo goed zijn én over een Nederlands beursbedrijf dat mogelijk het Damrak gaat verlaten.See omnystudio.com/listener for privacy information.
In today's episode of iGaming Daily, SBC Media Manager Charlie Horner is joined by SBC's Managing Editor Jessica Welman and IMGL's Sean McGuinness, Partner at Butler Snow LLP, as the trio discuss the recent Colorado court ruling on where an online bet legally takes place, reigniting debate over the 'hub and spoke' model and its implications for tribal and commercial gaming in the United States.They unpack how this decision could reshape the landscape for tribal sovereignty, state regulation, and national gaming policy going forward.Tune in to today's episode to find out:What the Colorado ruling means for the future of the hub and spoke model in online betting.How this decision could impact tribal gaming compacts and sovereignty across the U.S.Why New Jersey's 2013 model continues to influence modern online wagering law.The key legal arguments driving the expected appeal and what precedents could shape it.What this case could signal for the future of online and tribal gaming regulation in the U.S.Host: Charlie HornerGuests: Jessica Welman & Sean McGuinnessProducer: Anaya McDonaldEditor: Anaya McDonaldiGaming Daily is also now on TikTok. Make sure to follow us at iGaming Daily Podcast (@igaming_daily_podcast) | TikTok for bite-size clips from your favourite podcast. Finally, remember to check out Optimove at https://hubs.la/Q02gLC5L0 or go to Optimove.com/sbc to get your first month free when buying the industry's leading customer-loyalty service.Article Links:https://sbcamericas.com/2025/10/27/co-sky-ute-sportsbook-dismissal/
#322: Peer-to-peer technology represents a fundamental shift in how we think about data sovereignty and application architecture. Rather than relying on centralized servers and trusting specific endpoints, peer-to-peer systems allow users to verify data authenticity regardless of its source. This approach eliminates the traditional point-to-point communication model where data flows from a specific server to your device, instead creating networks where any peer can help distribute content while maintaining cryptographic verification. The technology offers compelling advantages for developers and users alike. Applications built on peer-to-peer foundations can operate without ongoing infrastructure costs, scale naturally as more users join the network, and continue functioning even if the original company disappears. Development becomes simpler in many ways since everything runs locally by default, eliminating complex database configurations and external dependencies. However, challenges remain around debugging distributed systems, ensuring data persistence in small networks, and adapting traditional development workflows to this new paradigm. In this episode, Darin and Viktor explore these concepts with Mathias Buus Madsen, co-founder of Holepunch and creator of the Pear Runtime. Mathias shares insights from building real peer-to-peer applications, including their chat app Keet, and explains how developers can start experimenting with this technology today. Mathias' contact information: LinkedIn: https://www.linkedin.com/in/mathiasbuus/ X: https://x.com/mafintosh YouTube channel: https://youtube.com/devopsparadox Review the podcast on Apple Podcasts: https://www.devopsparadox.com/review-podcast/ Slack: https://www.devopsparadox.com/slack/ Connect with us at: https://www.devopsparadox.com/contact/
In this episode of Cybersecurity Today, host Jim Love explores the potential shift in Russia's stance on cyber criminals, including arrests of major network operators. Discover the latest phishing scams where hackers fabricate death notices to steal passwords, a critical vulnerability exposing thousands of AI servers, and a massive malware campaign on YouTube. Plus, discuss the dual nature of AI in cybersecurity—both as a transformative technology and a new threat. Join the conversation on the future of cybersecurity! 00:00 Introduction: Cybersecurity Headlines 00:26 Russia's Crackdown on Cybercriminals 02:47 Phishing Scam Targets LastPass Users 04:59 AI Server Vulnerability Exposes API Keys 07:28 YouTube Ghost Network Spreads Malware 09:17 The Dual Role of AI in Cybersecurity 12:18 Conclusion and Future Plans
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden's power grid operator confirms a cyberattack. Italian spyware targets Russian and Belarusian organizations. The U.S. declines to sign the new UN cyber treaty. Ransomware payments fall to record lows. U.S. Cyber Chief calls for a “clean American tech stack” to counter China's global surveillance push. On today's Threat Vector segment, David Moulton speaks with two cybersecurity leaders from Palo Alto Networks: Sarit Tager and Krithivasan Mecheri. AI mistakes Doritos for a deadly weapon. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector On today's Threat Vector segment, David Moulton speaks with two cybersecurity leaders from Palo Alto Networks: Sarit Tager and Krithivasan Mecheri (Krithi). Together, they dive into the urgent challenges of securing modern development in the age of AI and "Shifting Security Left". You can listen to their full conversation here, and catch new episodes every Thursday on your favorite podcast app. Selected Reading Microsoft WSUS attacks hit 'multiple' orgs, Google warns (The Register) Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack (SecurityWeek) Google says talk of Gmail breach impacting millions not true (The Register) 'Herodotus' Android Trojan Mimics Human Sluggishness (Gov Infosecurity) Hackers Target Swedish Power Grid Operator (SecurityWeek) Italian-made spyware spotted in breaches of Russian, Belarusian systems (The Record) US declines to join more than 70 countries in signing UN cybercrime treaty (The Record) Ransomware profits drop as victims stop paying hackers (Bleeping Computer) National cyber director says U.S. needs to counter Chinese surveillance, push American tech (CyberScoop) Armed police handcuff teen after AI mistakes crisp packet for gun in US (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textSecurity gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now.Eric shares takeaways from Offensive AI Con: how models help triage code and surface likely bug classes, why decomposed workflows beat “find all vulns” prompts, and what happens when toy benchmarks meet stubborn, real binaries. We explore reinforcement learning environments as a scalable way to train security behaviors without leaking sensitive data, and we grapple with the uncomfortable reality that jailbreaks aren't going away—so output validation, sandboxing, and principled boundaries must do the heavy lifting.We also dig into Garak, the open-source system security scanner that targets LLM-integrated apps where it hurts: prompted cross-site scripting, template injection in Jinja, and OS command execution. By mapping findings to CWE, Garak turns vague model “misbehavior” into concrete fixes tied to known controls. Along the way, we compare GPT, Claude, and Grok, talk through verification habits to counter confident nonsense, and zoom out on careers: cultivate niche depth, stay broadly literate, and keep your skepticism calibrated. If you've ever wondered how to harness AI without handing it the keys to prod, this one's for you.Enjoyed the episode? Follow, share with a teammate, and leave a quick review so more builders and defenders can find the show.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Parce que… c'est l'épisode 0x651! Shameless plug 4 et 5 novembre 2025 - FAIRCON 2025 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2025 - SSTIC 2026 Notes Incidents What the Huge AWS Outage Reveals About the Internet A single DNS race condition brought AWS to its knees Amazon brain drain finally caught up with AWS Louvre heist raises decades-old questions about museum security IA Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys The security paradox of local LLMs OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs OpenAI's New Browser Raises ‘Insurmountably High' Security Concerns Perplexity's Comet Browser Screenshot Feature Vulnerability Let Attackers Inject Malicious Prompts MCP attack uses predictable session IDs to hijack AI agents Zero Trust Has a Blind Spot—Your AI Agents Sneaky Mermaid attack in Microsoft 365 Copilot steals data AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your Organization One in five security breaches now thought to be caused by AI-written code Privacy Microsoft Teams to Auto-Set Work Location by Detecting the Wi-Fi Network Polish PM: former government used Pegasus spyware to surveil my wife and daughter The Internet's Biggest Annoyance: Why Cookie Laws Should Target Browsers, Not Websites Blue 5 Deception Solutions that are Changing the Cybersecurity Game You Still Shouldn't Use a Browser Password Manager Microsoft admits File Explorer Preview pane won't work in Windows 11 25H2 for internet files by default Myanmar military detains 2,000 people in raid at cybercrime center Shifting from reactive to proactive: Cyber resilience amid nation-state espionage Proofpoint releases innovative detections for threat hunting: PDF Object Hashing OpenBSD 7.8 out now and 9front's ‘Release' released OpenBSD 7.8 ChkTag: x86 Memory Safety Réserve européenne de cybersécurité : l'Union se dote d'un bouclier commun Red GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace Self-Propagating GlassWorm Poisons VS Code Extensions Network security devices endanger orgs with '90s era flaws 706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online - PoC Released Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials The YouTube Ghost Network: How Check Point Research Helped Take Down 3,000 Malicious Videos Spreading Malware Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories Inside the attack chain: Threat activity targeting Azure Blob Storage Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens Critical WSUS Flaw (CVE-2025-59287, CVSS 9.8) Allows Unauthenticated RCE via Unsafe Cookie Deserialization, PoC Available Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset ‘PassiveNeuron' Cyber Spies Attack With Custom Malware Airport PA System Hack: How Attackers Hijacked Announcements in the US and Canada - Cyberwarzone China finds “irrefutable evidence” of US NSA cyberattacks on time Authority Collaborateurs Nicolas-Loïc Fortin Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc
Rideshare Rodeo Podcast ROUNDTABLE THURSDAY October 24th, 2025 This weeks topics: AMAZON AWS SERVERS BACK UP Uber will give drivers $4,000 to switch to E.V. DOORDASH SEXUAL HARASSMENT Uber Eats Drivers Autistic Son Leaves Car, Driver Keeps Delivering TikTok Creater @CEOOFCOMPLAININ very strange hotel story PETITION ON CHANGE(.org): Transparency Petition Rideshare Rodeo Brand & Podcast: Rideshare Rodeo Podcast
Join Dan Vega as he sits down with Spring Security expert Daniel Garnier-Moiroux to explore the critical world of MCP (Model Context Protocol) server security. As MCP has taken over the AI world, enterprise deployments need robust security and permission management for exposed endpoints Securing MCP Servers with Spring AI. Daniel walks through his approach to securing MCP Servers with OAuth2 access tokens and how Spring AI applications can leverage the spring-ai-community/mcp-security project Securing MCP Servers with Spring AI. Learn why proper authentication isn't optional when exposing AI tools and resources, discover best practices for implementing authorization servers, and understand how to protect your MCP endpoints from vulnerabilities. Whether you're building private or enterprise MCP servers, this episode delivers essential security insights for the Spring AI ecosystem.Show Notes: Blog Post: Securing MCP Servers with Spring AIDaniel Garnier-Moiroux BlueSkyLinkedIn
Russian state hackers replace burned malware with new tools Recent Windows updates cause login issues on some PCs Sophisticated campaign targets servers of high-profile organizations Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero-trust endpoint protection platform, ThreatLocker fills the gaps traditional solutions leave behind, giving your business stronger security and control. Don't just react to threats — stop them with ThreatLocker.
Scott and Wes break down the top-tier MCP servers developers are using right now. From browser automation to debugging superpowers, they explore how these servers are changing what's possible in modern dev workflows. Show Notes 00:00 Welcome to Syntax! 01:52 Brought to you by Sentry.io. 02:46 Submit your Spooky Stories! 03:37 Syntax San Francisco Meetup. 04:11 S-Tier MCP Servers. 04:17 Sentry MCP Server (not sponsored). 05:01 Pause, what the heck is an MCP server. 05:45 Back to the Sentry MCP. 07:07 Spotlight JS. 09:08 ElevenLabs MCP hack. 11:19 Docs Tools. 11:29 Context7. 15:55 GitHub MCP Registry. 16:10 Nuxt MCP Server. 16:25 Svelte MCP Server. 20:35 Cloudflare MCP Servers. 22:34 Chrome Dev Tools (Playwright) MCP Server. 25:17 Stripe MCP Server. 27:55 Mastra. Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads
MONDAY HR 1 Monsters Weekend recap Angel checks goes to the Turnstile concert!! Internet is down. Servers apps. Angel checks out A Petrified Forest See omnystudio.com/listener for privacy information.
MONDAY HR 1 Monsters Weekend recap Angel checks goes to the Turnstile concert!! Internet is down. Servers apps. Angel checks out A Petrified Forest
Welcome to the 2025 Fall Pledge Drive Memories addition! We are extremely happy to look back on the past of the Diocese of Boise and share some amazing Memories! Salt and Light Radio is 100% Listener Supported. Thank you for giving us 15 years to help be the hands and Feet of Christ and spread the Good News of the Catholic Faith. Please Help support our mission by donating! If you are listening to this Live ( 10/15- 10/17) feel free to call in at 208-344-4774 or make a secure online donation at Make a donation - Salt & Light Radio - BOISE, ID Take Me Back to Pledge Drive Archives Pledge Drive Archive - Salt & Light Radio - BOISE, ID
The Billy & Lisa Show cover a whole bunch of topics during today's show including Billy's skin flaking off, Riley Donovan's Golden Bachelor update and the biggest pet peeves servers have! Listen to Billy & Lisa weekdays from 6-10AM on Kiss 108!
Bret is joined by Philip Andrews and Dan Muret of Cast AI to discuss pod live migration between nodes in a Kubernetes cluster.
HR3 How Hundreds of Sim Servers and Over 100,000 Sim Cards Could Have Taken Down America. 10-6-25 by John Rush
Curious about what really goes on inside a cloud data center? In this episode, Lois Houston and Nikita Abraham chat with Principal OCI Instructor Orlando Gentil about how cloud data centers are transforming the way organizations manage technology. They explore the differences between traditional and cloud data centers, the roles of CPUs, GPUs, and RAM, and why operating systems and remote access matter more than ever. Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hi everyone! Today, we're covering the fundamentals you need to be successful in a cloud environment. If you're new to cloud, coming from a SaaS environment, or planning to move from on-premises to the cloud, you won't want to miss this. With us today is Orlando Gentil, Principal OCI Instructor at Oracle University. Hi Orlando! Thanks for joining us. 01:01 Lois: So Orlando, we know that Oracle has been a pioneer of cloud technologies and has been pivotal in shaping modern cloud data centers, which are different from traditional data centers. For our listeners who might be new to this, could you tell us what a traditional data center is? Orlando: A traditional data center is a physical facility that houses an organization's mission critical IT infrastructure, including servers, storage systems, and networking equipment, all managed on site. 01:32 Nikita: So why would anyone want to use a cloud data center? Orlando: The traditional model requires significant upfront investment in physical hardware, which you are then responsible for maintaining along with the underlying infrastructure like physical security, HVAC, backup power, and communication links. In contrast, cloud data centers offer a more agile approach. You essentially rent the infrastructure you need, paying only for what you use. In the traditional data center, scaling resources up and down can be a slow and complex process. On cloud data centers, scaling is automated and elastic, allowing resources to adjust dynamically based on demand. This shift allows business to move their focus from the constant upkeep of infrastructure to innovation and growth. The move represents a shift from maintenance to momentum, enabling optimized costs and efficient scaling. This fundamental shift is how IT infrastructure is managed and consumed, and precisely what we mean by moving to the cloud. 02:39 Lois: So, when we talk about moving to the cloud, what does it really mean for businesses today? Orlando: Moving to the cloud represents the strategic transition from managing your own on-premise hardware and software to leveraging internet-based computing services provided by a third-party. This involves migrating your applications, data, and IT operations to a cloud environment. This transition typically aims to reduce operational overhead, increase flexibility, and enhance scalability, allowing organizations to focus more on their core business functions. 03:17 Nikita: Orlando, what's the “brain” behind all this technology? Orlando: A CPU or Central Processing Unit is the primary component that performs most of the processing inside the computer or server. It performs calculations handling the complex mathematics and logic that drive all applications and software. It processes instructions, running tasks, and operations in the background that are essential for any application. A CPU is critical for performance, as it directly impacts the overall speed and efficiency of the data center. It also manages system activities, coordinating user input, various application tasks, and the flow of data throughout the system. Ultimately, the CPU drives data center workloads from basic server operations to powering cutting edge AI applications. 04:10 Lois: To better understand how a CPU achieves these functions and processes information so efficiently, I think it's important for us to grasp its fundamental architecture. Can you briefly explain the fundamental architecture of a CPU, Orlando? Orlando: When discussing CPUs, you will often hear about sockets, cores, and threads. A socket refers to the physical connection on the motherboard where a CPU chip is installed. A single server motherboard can have one or more sockets, each holding a CPU. A core is an independent processing unit within a CPU. Modern CPUs often have multiple cores, enabling them to handle several instructions simultaneously, thus increasing processing power. Think of it as having multiple mini CPUs on a single chip. Threads are virtual components that allow a single CPU core to handle multiple sequence of instructions or threads concurrently. This technology, often called hyperthreading, makes a single core appear as two logical processors to the operating system, further enhancing efficiency. 05:27 Lois: Ok. And how do CPUs process commands? Orlando: Beyond these internal components, CPUs are also designed based on different instruction set architectures which dictate how they process commands. CPU architectures are primarily categorized in two designs-- Complex Instruction Set Computer or CISC and Reduced Instruction Set Computer or RISC. CISC processors are designed to execute complex instructions in a single step, which can reduce the number of instructions needed for a task, but often leads to a higher power consumption. These are commonly found in traditional Intel and AMD CPUs. In contrast, RISC processors use a simpler, more streamlined set of instructions. While this might require more steps for a complex task, each step is faster and more energy efficient. This architecture is prevalent in ARM-based CPUs. 06:34 Are you looking to boost your expertise in enterprise AI? Check out the Oracle AI Agent Studio for Fusion Applications Developers course and professional certification—now available through Oracle University. This course helps you build, customize, and deploy AI Agents for Fusion HCM, SCM, and CX, with hands-on labs and real-world case studies. Ready to set yourself apart with in-demand skills and a professional credential? Learn more and get started today! Visit mylearn.oracle.com for more details. 07:09 Nikita: Welcome back! We were discussing CISC and RISC processors. So Orlando, where are they typically deployed? Are there any specific computing environments and use cases where they excel? Orlando: On the CISC side, you will find them powering enterprise virtualization and server workloads, such as bare metal hypervisors in large databases where complex instructions can be efficiently processed. High performance computing that includes demanding simulations, intricate analysis, and many traditional machine learning systems. Enterprise software suites and business applications like ERP, CRM, and other complex enterprise systems that benefit from fewer steps per instruction. Conversely, RISC architectures are often preferred for cloud-native workloads such as Kubernetes clusters, where simpler, faster instructions and energy efficiency are paramount for distributed computing. Mobile device management and edge computing, including cell phones and IoT devices where power efficiency and compact design are critical. Cost optimized cloud hosting supporting distributed workloads where the cumulative energy savings and simpler design lead to more economical operations. The choice between CISC and RISC depends heavily on the specific workload and performance requirements. While CPUs are versatile generalists, handling a broad range of tasks, modern data centers also heavily rely on another crucial processing unit for specialized workloads. 08:54 Lois: We've spoken a lot about CPUs, but our conversation would be incomplete without understanding what a Graphics Processing Unit is and why it's important. What can you tell us about GPUs, Orlando? Orlando: A GPU or Graphics Processing Unit is distinct from a CPU. While the CPU is a generalist excelling at sequential processing and managing a wide variety of tasks, the GPU is a specialist. It is designed specifically for parallel compute heavy tasks. This means it can perform many calculations simultaneously, making it incredibly efficient for workloads like rendering graphics, scientific simulations, and especially in areas like machine learning and artificial intelligence, where massive parallel computation is required. In the modern data center, GPUs are increasingly vital for accelerating these specialized, data intensive workloads. 09:58 Nikita: Besides the CPU and GPU, there's another key component that collaborates with these processors to facilitate efficient data access. What role does Random Access Memory play in all of this? Orlando: The core function of RAM is to provide faster access to information in use. Imagine your computer or server needing to retrieve data from a long-term storage device, like a hard drive. This process can be relatively slow. RAM acts as a temporary high-speed buffer. When your CPU or GPU needs data, it first checks RAM. If the data is there, it can be accessed almost instantaneously, significantly speeding up operations. This rapid access to frequently used data and programming instructions is what allows applications to run smoothly and systems to respond quickly, making RAM a critical factor in overall data center performance. While RAM provides quick access to active data, it's volatile, meaning data is lost when power is off, or persistent data storage, the information that needs to remain available even after a system shut down. 11:14 Nikita: Let's now talk about operating systems in cloud data centers and how they help everything run smoothly. Orlando, can you give us a quick refresher on what an operating system is, and why it is important for computing devices? Orlando: At its core, an operating system, or OS, is the fundamental software that manages all the hardware and software resources on a computer. Think of it as a central nervous system that allows everything else to function. It performs several critical tasks, including managing memory, deciding which programs get access to memory and when, managing processes, allocating CPU time to different tasks and applications, managing files, organizing data on storage devices, handling input and output, facilitate communication between the computer and its peripherals, like keyboards, mice, and displays. And perhaps, most importantly, it provides the user interface that allows us to interact with the computer. 12:19 Lois: Can you give us a few examples of common operating systems? Orlando: Common operating system examples you are likely familiar with include Microsoft Windows and MacOS for personal computers, iOS and Android for mobile devices, and various distributions of Linux, which are incredibly prevalent in servers and increasingly in cloud environments. 12:41 Lois: And how are these operating systems specifically utilized within the demanding environment of cloud data centers? Orlando: The two dominant operating systems in data centers are Linux and Windows. Linux is further categorized into enterprise distributions, such as Oracle Linux or SUSE Linux Enterprise Server, which offer commercial support and stability, and community distributions, like Ubuntu and CentOS, which are developed and maintained by communities and are often free to use. On the other side, we have Windows, primarily represented by Windows Server, which is Microsoft's server operating system known for its robust features and integration with other Microsoft products. While both Linux and Windows are powerful operating systems, their licensing modes can differ significantly, which is a crucial factor to consider when deploying them in a data center environment. 13:43 Nikita: In what way do the licensing models differ? Orlando: When we talk about licensing, the differences between Linux and Windows become quite apparent. For Linux, Enterprise Distributions come with associated support fees, which can be bundled into the initial cost or priced separately. These fees provide access to professional support and updates. On the other hand, Community Distributions are typically free of charge, with some providers offering basic community-driven support. Windows server, in contrast, is a commercial product. Its license cost is generally included in the instance cost when using cloud providers or purchased directly for on-premise deployments. It's also worth noting that some cloud providers offer a bring your own license, or BYOL program, allowing organizations to use their existing Windows licenses in the cloud, which can sometimes provide cost efficiencies. 14:46 Nikita: Beyond choosing an operating system, are there any other important aspects of data center management? Orlando: Another critical aspect of data center management is how you remotely access and interact with your servers. Remote access is fundamental for managing servers in a data center, as you are rarely physically sitting in front of them. The two primary methods that we use are SSH, or secure shell, and RDP, remote desktop. Secure shell is widely used for secure command line access for Linux servers. It provides an encrypted connection, allowing you to execute commands, transfer files, and manage your servers securely from a remote location. The remote desktop protocol is predominantly used for graphical remote access to Windows servers. RDP allows you to see and interact with the server's desktop interface, just as if you were sitting directly in front of it, making it ideal for tasks that require a graphical user interface. 15:54 Lois: Thank you so much, Orlando, for shedding light on this topic. Nikita: Yeah, that's a wrap for today! To learn more about what we discussed, head over to mylearn.oracle.com and search for the Cloud Tech Jumpstart course. In our next episode, we'll take a close look at how data is stored and managed. Until then, this is Nikita Abraham… Lois: And Lois Houston, signing off! 16:16 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Bad lighting and too-loud music. Servers on cellphones and wobbly tables. We all have our restaurant pet peeves—just as restaurants have their gripes about customers. This week, Arch Eats hosts George Mahe and Cheryl Baehr are devoting the entire episode to its most popular segment, the microrant. They’ll good-naturedly dish on restaurants’ biggest offenses and, to keep things even, share what restaurants wish their guests would stop doing, all in the spirit of making the experience of dining out more pleasant for everyone involved. Listen and follow Arch Eats on YouTube, Spotify, Apple Podcasts, or wherever podcasts are available. This episode is sponsored by Butler’s Pantry. With the holidays around the corner, Butler’s Pantry is ready to make St. Louis celebrations delicious. From corporate parties to family gatherings, every event is a chef-driven culinary experience. Get a taste of the season. New to podcasts? Follow these instructions to start listening to our shows, and hear what you’ve been missing! Have an idea for a future Arch Eats episode? Send your thoughts or feedback by emailing podcasts@stlmag.com. Hungry for more? Subscribe to our Dining newsletters for the freshest coverage on the local restaurant and culinary scene. And follow George (@georgemahe) and SLM on Instagram (@stlouismag). Interested in being a podcast sponsor? Contact Lauren Leppert at lleppert@stlmag.com. Mentioned in this episode: The following establishments were mentioned favorably in this episode and were not part of the microrants. Jinzen, 8113 Maryland, Clayton, 314-354-8086. Il Palato, 222 S. Bemiston, Clayton, 314-224-5331. Lucy Quinn, 4156 Manchester, The Grove, 314-932-5829. The Mexican STL, 9615 Watson, Crestwood, 314-525-5025. Corner 17, 6623 Delmar, Delmar Loop, 314-727-2402. See omnystudio.com/listener for privacy information.
If your MCP server has dozens of tools, it's probably built wrong.You need tools that are specific and clear for each use case—but you also can't have too many. This creates an almost impossible tradeoff that most companies don't know how to solve.That's why we interviewed Alex Rattray, the founder and CEO of Stainless. Stainless builds APIs, SDKs, and MCP servers for companies like OpenAI and Anthropic. Alex has spent years mastering how to make software talk to software, and he came on the show to share what he knows. We get into MCP and the future of the AI-native internet.If you found this episode interesting, please like, subscribe, comment, and share.Want even more?Sign up for Every to unlock our ultimate guide to prompting ChatGPT here: https://every.ck.page/ultimate-guide-to-prompting-chatgpt. It's usually only for paying subscribers, but you can get it here for free.To hear more from Dan Shipper:- Subscribe to Every: https://every.to/subscribe- Follow him on X: https://twitter.com/danshipperReady to build a site that looks hand-coded—without hiring a developer? Launch your site for free at Framer.com, and use code DAN to get your first month of Pro on the house.Timestamps:00:00:00 - Start00:01:14 - Introduction00:02:54 - Why Alex likes running barefoot00:05:09 - APIs and MCP, the connectors of the new internet00:10:53 - Why MCP servers are hard to get right00:20:07 - Design principles for reliable MCP servers00:23:50 - Scaling MCP servers for large APIs00:25:14 - Using MCP for business ops at Stainless00:28:12 - Building a company brain with Claude Code00:33:59 - Where MCP goes from here00:41:10 - Alex's take on the security model for MCPLinks to resources mentioned in the episode:- Alex Rattray: Alex Rattray (@RattrayAlex), Alex Rattray - Stainless: https://www.stainless.com/
Chad and Sami share some learning moments with one another as they discuss the recent projects they've been working on at thoughtbot. The pair question how much time and effort we should be investing into a problem with AI vs the outcome we receive, their work and experimentation with MCP servers, Sami shares his big bid on AI to save some time, while Chad tells the tragic tale of why he stopped playing Diablo IV. — Don't forget we have a YouTube channel (https://www.youtube.com/@thoughtbot) where you can watch all the streams mentioned in this episode along with video versions of the show. You can find Chad all over social media as @cpytel and Sami through his website (https://samibirnbaum.com). You can also connect with the duo via their LinkedIn pages - Chad (https://www.linkedin.com/in/cpytel/) - Sami (https://www.linkedin.com/in/samibirnbaum/). If you would like to support the show, head over to our GitHub page (https://github.com/sponsors/thoughtbot), or check out our website (https://podcast.thoughtbot.com). Got a question or comment about the show? Why not write to our hosts: hosts@giantrobots.fm This has been a thoughtbot (https://thoughtbot.com/) podcast. Stay up to date by following us on social media - LinkedIn (https://www.linkedin.com/company/150727/) - Mastodon (https://thoughtbot.social/@thoughtbot) - YouTube (https://www.youtube.com/thoughtbotvideo) - Bluesky (https://bsky.app/profile/thoughtbot.com) © 2025 thoughtbot, inc.
Join Lucas, Matt, Chambers, and Hot Mickey as they dive into the latest topical news, including Chambers's adventures in crazy corners of the internet! Learn more about your ad choices. Visit megaphone.fm/adchoices
Ze dachten dat ze ervanaf waren bij Philips. Patiënten, slachtoffers, de Amerikaanse toezichthouder... Met iedereen hadden ze een schikking weten te treffen in het drama rond de apneu-apparaten die vlam vatten. Toch moet Philips nog even herinnerd worden aan het schandaal dat de beurskoers jarenlang in z'n greep had. Want juist die beleggers die hun geld zagen verdampen, die willen nu hun gelijk krijgen. De VEB vraagt de rechter om een onafhankelijk onderzoek, en mocht dat grote fouten bij Philips uitwijzen dan kan er een schadevergoeding geëist worden. Hoe gaat Philips het apneu-spook weer terug in de fles krijgen? En is het dan ein-de-lijk klaar met het drama? Dat bespreken we deze aflevering. Dan pakken we ook de meetlat erbij. We gaan kijken wie de grootste heeft. Amerika of China? We hebben het over hun datacenters. Bedrijven in beide landen blijven maar keer op keer nieuwe plannen aankondigen. De geldput lijkt geen bodem te hebben. Maar wie wint uiteindelijk? En het gaat ook nog over de treurwilg van de dag. Dat is Jerome Powell, de baas van de Federal Reserve. Hij drukt de stemming met een speech vol waarschuwingen over de lage rente, de arbeidsmarkt, en: de 'redelijk hoog gewaardeerde aandelen'.See omnystudio.com/listener for privacy information.
NVIDIA has made a significant move by investing $5 billion in Intel, acquiring approximately 4% ownership of the company. This partnership aims to co-develop custom data center and personal computer products, integrating NVIDIA's advanced AI and accelerated computing capabilities with Intel's leading CPU technologies. The collaboration is expected to create custom x86 chips that will be manufactured by Intel to NVIDIA's specifications, potentially generating an annual opportunity worth between $25 and $50 billion once the products are launched. Despite this partnership, Intel will continue to develop its own ARC graphic processing units, although the messaging around this dual focus may create confusion.The Federal Reserve has cut interest rates by a quarter point, a decision framed as a risk management measure amid a cooling labor market. While job gains have slowed and inflation remains high, the Fed's cautious approach indicates limited support for deeper cuts. In the tech sector, the U.S. personal computer industry is facing challenges, with shipments declining due to inventory issues and consumer reluctance to upgrade their devices, even with the impending end of support for Windows 10. This stagnation in consumer sales reflects broader economic uncertainties as buyers prioritize essential expenses.Meanwhile, global spending on artificial intelligence is projected to reach nearly $1.5 trillion this year, driven by a boom in cloud data center construction and rising enterprise investments in AI technologies. Despite the enthusiasm surrounding AI, a recent McKinsey report reveals that 80% of companies utilizing generative AI have not seen tangible impacts on their earnings, highlighting a disconnect between the hype and real-world performance. As stock prices rise, recession signals are emerging, suggesting a need for caution in an increasingly concentrated market.Managed service providers (MSPs) are strategically positioned within a $608 billion industry, despite a decline in optimism regarding significant revenue growth. The demand for managed IT services continues to rise, with many providers diversifying their revenue streams by offering consulting and design services. Additionally, IT outages are costing businesses an estimated $76 million annually, emphasizing the importance of uptime over tools. As the landscape evolves, providers must focus on delivering outcomes rather than competing solely on software, ensuring that customers receive the value they need to maintain business continuity. Three things to know today00:00 Fed Rate Cut, PC Sales Slump, and $1.5T AI Hype: Why IT Providers Must Focus on Security and Outcomes04:36 $76M Downtime Losses, Cooling MSP Optimism, 7x Security Multipliers, and Mainframe ROI—All Point to Services as the Real Value08:16 Nvidia Buys 4% of Intel in $5B Deal, Betting on Custom AI Chips for Servers and PCs This is the Business of Tech. Supported by: https://scalepad.com/dave/Webinar: https://bit.ly/msprmail All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In 2002, Battlefield 1942 redefined multiplayer shooters by combining infantry, tanks, ships, and planes on massive, team-based maps. We rewind to the roots of DICE and Refraction Games, from digital pinball tables to the ambitious Codename Eagle, and how their merger set the stage for Battlefield's debut. The episode highlights EA's role in finally backing the project, the Refractor engine's technical leap, and the launch maps that turned every match into a story generator. Critics praised its scale and innovation, though single-player bot matches left some underwhelmed. Our conversation explores emergent stunts, early fan culture, influential mods like Desert Combat, and Battlefield's long legacy in shaping online play. Join us as we storm, soar, and shell our way through Battlefield 1942 on today's trip down Memory Card Lane.Read transcript
Missing the server room? Need someone to help with an offline printer? Spend eight hours among your favorite overly refrigerated colleagues.Have you ever noticed how IT folks walk around with waiter eyes when they're outside their domain? You know, waiter eyes, like when you need a refill on your Mountain Dew and the dude or lady catches you in their peripheral… but just keeps walking?And I get it. It's lucky the people who make printers didn't make Voyager, we'd have lost Voyager by the asteroid belt. You can just look at printer funny and it will go offline, but somehow just for your computer. And that's why IT is there right? Aside from guarding their overly air-conditioned domain.Once, I had a manager ask an IT staffer to order him a new chair mat.Usually, when I see IT roaming the office, I remember all those weird mouse issues I want answered. (Mac folks: have you noticed third-party Bluetooth mice acting up? Since updating to Sonoma, I've had nonstop issues with tracking speed resetting. And any time Bluetooth headphones are in use, it somehow causes lag in mouse movement. I've switched back to a wired mouse, for ****'s sake.)So, I get why y'all hide in the server room.
While Donald Trump is bent on achieving and maintaining “unquestioned and unchallenged global technological dominance”, we're just starting to gear up for the race. There are only about 300 data centres across Canada. And about HALF of them are run by American tech giants like Amazon, Google, and Microsoft. Host Noor Azrieh sits down with Don Lenihan and Vass Bednar and asks whether we can control our digital sovereignty. Host: Noor AzriehCredits: Aviva Lessard (Senior Producer), Sam Konnert (Producer), Noor Azrieh (Host/Producer), Caleb Thompson (Post Production), Max Collins (Director of Audio) Jesse Brown (Editor), Tony Wang (Artwork)Guests: Don Lenihan, Vass BednarFurther Reading On Our WebsiteSponsors: Article is offering our listeners $50 off your first purchase of $100 or more. To claim, visit ARTICLE.COM/canadaland and the discount will be automatically applied at checkoutIf you value this podcast, Support us! You'll get premium access to all our shows ad free, including early releases and bonus content. You'll also get our exclusive newsletter, discounts on merch, tickets to our live and virtual events, and more than anything, you'll be a part of the solution to Canada's journalism crisis, you'll be keeping our work free and accessible to everybody. You can listen ad-free on Amazon Music—included with Prime.Can't get enough Canadaland? Follow @Canadaland_Podcasts on Instagram for clips, announcements, explainers and more.Canadaland Politics is recording a LIVE podcast and Q&A from Calgary on September 22nd, 2025 at 7:30PM MT hosted by Mount Royal University. Let us know you're coming by RSVPing here: https://forms.gle/LoxvdZ8LFfubFpGeA Hosted on Acast. See acast.com/privacy for more information.
In this episode, the hosts welcome back David Jarvis, co-founder and CEO of Griffin, for his second appearance on the show. The discussion centres on the emerging concept of agentic banking and Griffin's development of the MCP server. David explains how the MCP server enables AI models to interact with banking APIs using a configuration file, significantly enhancing automation and functionality. The conversation explores how this technology could transform areas such as corporate treasury, wealth management, and broader financial services. David outlines how AI agents might one day handle complex tasks traditionally managed by intermediaries like mortgage brokers and treasurers, streamlining operations and reducing costs. While still in the early stages, this innovation is already gaining interest from banks and fintech firms. The episode also looks ahead to the future of AI in banking, examining both the potential and the practical challenges of integrating agentic systems into existing infrastructure. Listeners can find out more via Griffin's website (https://griffin.com/) and blog.
Episode 203 is stacked, dude. Here's everything I covered this week, all in one place:First off, I'm plugging Megs' new blown booby art. It started as a bit, now it's real. One-of-one paintings made with, you guessed it, paint and boobs. You can buy them right now at wadpod.com/art. Support a local artist, hang them in your house, and flex on your neighbors.-- wawdpod.com/art Then I had to address the Olive Garden incident. Yes, I “hit” an old lady with my car in the parking lot. But before you judge me, she came at my son inside the restaurant first. He was happy, eating his chicken tenders, making a few sound effects like kids do. She waddled over, told Megs she was a terrible mom, then waddled up front to complain again. Servers literally came to apologize to us. People out here policing autistic kids like they run the parenting Olympics. What are we doing?From there we dove into the chaos that is the Cracker Barrel rebrand. New logo, new look, stock prices tanking, internet rioting. I stepped in like the digital savior I am and designed a better logo myself. I'm now officially the face of Cracker Barrel 2025, partnered with their new CEO, who is sneaky hot by the way. Everyone's mad, I think it's fine. Sydney Sweeney's joining me as brand ambassador, and we're saving breakfast one biscuit at a time.Then we had to talk about the Trump T1 phone scam. They're advertising a “gold” Trump phone, but it's literally a Samsung Galaxy S25 Ultra in a Spigen case… and they left the watermark on. Subscriptions are overpriced, fees everywhere, autopay only, and people are still buying it. Don't give Trump your debit card. Give me your debit card. wadpod.com/art.Trump wasn't done though. He's now using his so-called “peace talks” between Russia and Ukraine as cool points to get into heaven. He literally said on Fox News, “I want to get to heaven if possible. I'm hearing I'm not doing well.” Bro, if your afterlife strategy is saving 7,000 lives a week, maybe start by not scamming people with gold phones.Next up, internet news. AJ and Big Justice dropped their new single “Big Fat Meatballs” and it's the anthem nobody knew we needed. Central PA finally has its Drake and 21 Savage, but with marinara. Go stream it everywhere, or you're un-American.Meanwhile, Trisha Paytas linked up with Arby's. Yes, the queen of chaos is now the queen of beef and cheddar. She filmed a Jamoka Shake commercial that's peak Trisha. She's also out here naming her kids Elvis, Barbie, and Aquaman. Honestly, iconic.And finally, South Park roasted ChatGPT. They dropped a new episode where dudes are using AI to talk to their wives, and I've never felt more seen in my life. I told you already, if AI shuts down, I'm cooked. Emails, scripts, plans—gone. No more What Are We Doing podcast without it.That's the show. Episode 203, we covered:Booby art for sale.Olive Garden old lady beef.Cracker Barrel meltdown.Trump phone scam.Trump trying to buy a ticket into heaven.AJ & Big Justice meatball banger.Trisha Paytas x Arby's.South Park AI jokes.What are we doing?
Bret discusses exciting news about Swarm being maintained until 2030.
Get your FREE Cybersecurity Salary Guide:https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastJim Broome of Direct Defense has been doing red teaming since before it became a term — back when a "pentest" meant $25,000, no questions asked and walking out with a server under your arm. In this episode, Jim shares wild stories from decades of ethical hacking, including breaking into major tech companies, causing a cardiac event during a physical penetration test, and why he believes soft skills trump technical knowledge for aspiring red teamers. Learn why most companies aren't ready for red teaming, how to transition into cybersecurity from unexpected fields like education or event planning, and what it really takes to succeed in offensive security.0:00 - Intro to legendary red teamer Jim Broome1:00 - Cybersecurity Salary Guide2:58 - From BBS and ham radio to cybersecurity7:07 - Evolution from network admin to red teaming12:02 - GPS hacking and testing inflight entertainment systems15:31 - Hiring teachers and event planners as ethical hackers23:36 - Breaking into Symantec and stealing servers in the 90s28:33 - Physical pentest causes cardiac event34:06 - When companies should (and shouldn't) hire red teams39:44 - Why red teaming is "a punch in the mouth"44:09 - How AI is changing offensive and defensive security48:12 - Essential skills for aspiring red teamers50:39 - The groundskeeper who got domain admin52:18 - Best career advice: Be humbleView Cyber Work Podcast transcripts and additional episodes:https://www.infosecinstitute.com/podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
Welcome to Episode 408 of the Microsoft Cloud IT Pro Podcast. Part two of our exploration into Model Context Protocol (MCP) servers continues our hands-on discussion about finding, implementing, and getting the most out of MCP servers in your daily workflows. Your support makes this show possible! Please consider becoming a premium member for access to live shows and more. Check out our membership options. Show Notes Silicon Valley: Gilfoyle Made A Bot (Season 6 Episode 1 Clip) | HBO Lokka What is the Azure MCP Server (Preview)? Microsoft Learn Docs MCP Server overview Notion MCP Introducing Slack MCP Support Model Context Protocol servers Docker MCP Catalog About the sponsors Would you like to become the irreplaceable Microsoft 365 resource for your organization? Let us know!
On today's Extra, Servers, Gummy Bears, & Recorders Learn more about your ad choices. Visit podcastchoices.com/adchoices
Wes and Scott talk about how developers can expose powerful tools to AI using the Model Context Protocol. They discuss tool calling, remote MCP specs, authentication, and real-world use cases that make AI more capable through smarter integrations. Show Notes 00:00 Welcome to Syntax! 01:36 What is MCP? 07:23 MCP tools 11:33 MCP resources 13:43 Saving reusable prompts 16:18 Creating and validating MCP tools 18:31 Brought to you by Sentry.io 18:31 Tool calling vs MCP servers 21:28 Remote vs local MCP servers mcp-remote 26:24 Useful MCP servers mcp-server-cloudflare use-mcp awesome-mcp-servers 32:48 Sick Picks + Shameless Plugs Sick Picks Scott: Mario Kart World Wes: anyloop Kid's Watch Shameless Plugs Syntax YouTube Channel Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads
Aaron recaps the wins and lessons learned at BuildWitt this week. Questions or feedback? Email us at dirttalk@buildwitt.com! To learn more about attending the 2025 Ariat Dirt World Summit, visit www.dirtworld.com!
Want to Start or Grow a Successful Business? Schedule a FREE 13-Point Assessment with Clay Clark Today At: www.ThrivetimeShow.com Join Clay Clark's Thrivetime Show Business Workshop!!! Learn Branding, Marketing, SEO, Sales, Workflow Design, Accounting & More. **Request Tickets & See Testimonials At: www.ThrivetimeShow.com **Request Tickets Via Text At (918) 851-0102 See the Thousands of Success Stories and Millionaires That Clay Clark Has Helped to Produce HERE: https://www.thrivetimeshow.com/testimonials/ Download A Millionaire's Guide to Become Sustainably Rich: A Step-by-Step Guide to Become a Successful Money-Generating and Time-Freedom Creating Business HERE: www.ThrivetimeShow.com/Millionaire See Thousands of Case Studies Today HERE: www.thrivetimeshow.com/does-it-work/