Computer ציבורי
[search 0]
עוד
Download the App!
show episodes
 
Artwork
 
Jeden Samstag das Neueste aus Computertechnik und Informationstechnologie. Beiträge, Reportagen und Interviews zu IT-Sicherheit, Informatik, Datenschutz, Smartphones, Cloud-Computing und IT-Politik. Die Trends der IT werden kompakt und informativ zusammengefasst.
  continue reading
 
Die Redaktion von ComputerBase diskutiert im CB-Funk ganz ohne Gebrüll aktuelle Themen und gewährt Einblicke hinter die Kulissen: Warum hat die Redaktion wie berichtet oder getestet, was steht an, oder wo klemmt es? Wer sich schon immer gefragt hat, wie es in den Köpfen hinter ComputerBase tickt, ist hier genau richtig. Feedback, Vorschläge und Wünsche zum Podcast sind jederzeit gerne gesehen.
  continue reading
 
Artwork

1
Computer Club

Computer Club - Freddy & Smollie

icon
Unsubscribe
icon
icon
Unsubscribe
icon
שבועי
 
Welkom in Computer Club, een podcast door Frederik 'Freddy' De Bosschere en Thomas 'Smollie' Smolders! Wekelijks bespreken we de actualiteit op vlak van technologie en gaan we op zoek naar interessante feiten en innovaties. Er zijn ook jingles.
  continue reading
 
Artwork

1
Computertechnik Waide

Computertechnik Waide

icon
Unsubscribe
icon
icon
Unsubscribe
icon
יומי+
 
Computertechnik Waide – eine Marke der Kleffmann Media GmbH – ist Ihr regionaler Ansprechpartner für modernes IT-Consulting und professionelles IT-Outsourcing. Seit über 40 Jahren begleiten wir Unternehmen jeder Größe dabei, ihre IT effizienter und zukunftssicher zu gestalten. Neben klassischer Infrastrukturberatung unterstützen wir bei der Einführung von KI-Lösungen und Automatisierungstechnologien, um Prozesse zu optimieren und Wettbewerbsvorteile zu sichern.
  continue reading
 
Computerlaw Group LLP (www.computerlaw.com) provides strategic, knowledgeable, and effective business and intellectual property protection, licensing and litigation services to Internet, e-commerce, computer software, hardware and other high-tech businesses, teams and industry professionals throughout California, nationally and around the world. CLG produces THE VALLEY CURRENT as a way to keep its worldwide clients, co-counsels, colleagues, and friends aware of developments in Silicon Valley ...
  continue reading
 
The Computer Game Show is a weekly podcast about computer games, hosted by David Turner, Sean Bell, Mat Murray and James Farley. Listen every Wednesday on Apple Podcasts, Google Podcasts, Spotify and YouTube. Email [email protected] or visit tcgs.co to stream every episode, watch our Twitch streams, contact the show and more. Get exclusive content and more by supporting TCGS on Patreon at patreon.com/tcgs
  continue reading
 
The Computer Corner Radio Show with Gene Mitchell and Joe Myshko is on the air every Saturday morning from 8:00AM to 9:30AM. The Computer Corner show now airs on WCHE 1520. The show formerly aired on WCOJ 1420 in Chester County, PA. The Show is celebrating over 14 years.
  continue reading
 
Technology is changing fast. And it's changing our world even faster. Host Alix Dunn interviews visionaries, researchers, and technologists working in the public interest to help you keep up. Step outside the hype and explore the possibilities, problems, and politics of technology. We publish weekly.
  continue reading
 
A journey through many years (and occasionally centuries) to find out who is responsible for modern computer and video games. May contain balls, Napoleon Bonaparte, robots, organized crime, and the US Air Force.
  continue reading
 
Since 1995, Computer Talk with TAB has been on the air live each week providing an in-depth practical view of computers and their place in our everyday lives. A Computer Radio Program for everyone! Erik Semmel from TAB Computer Systems hosts the show and provides real time answers to caller’s questions. To keep the topics fresh and informative, guests are brought in as a result of listener’s questions and suggestions. The show is geared towards the everyday computer user with questions about ...
  continue reading
 
Artwork

1
Computer and Technology Radio

Marsha Collier and Marc Cohen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
חודשי+
 
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: [email protected] Twitter #techradio @MarshaCollier & @realmarccohen
  continue reading
 
Artwork

1
Computer Talk Radio

Benjamin Rockwell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
חודשי
 
Computer Talk Radio is a nationally syndicated broadcast radio program on computers and technology, and how they impact your life. Benjamin Rockwell, the show host and a computer nerd, leads the team as the expert guide through the technical jungle of jargon, and the valleys of viruses, to reach the pinnacle of power over your computer problems. Benjamin is joined by multiple team members who thrive on bringing you to the next level of knowledge. Keith M. Sedor has been a Certified Apple Mac ...
  continue reading
 
Artwork

1
Computeren

Samya Hafsaoui, Timo Harmelink, Marieke Kuypers & Spraakmaker Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
חודשי+
 
In de podcast Computeren nemen chronisch online journalisten Samya Hafsaoui, Marieke Kuypers en Timo Harmelink je wekelijks mee door de diepste krochten van het internet. We praten je bij over de memes, drama’s, en discussies die je móét kennen om o
  continue reading
 
Artwork

1
The Computer Exorcist Podcast

Marc-Anthony Arena

icon
Unsubscribe
icon
icon
Unsubscribe
icon
חודשי+
 
We're increasingly dependent on technology. Our business and personal lives rely on it, but as you've probably noticed, it's unreliable.They promise it'll get better, but it usually gets worse. Our computers are slow, so we end up squinting at smartphones. We live in constant fear that something's going to happen to our personal data. So we're scared into paying for fake protection that proves useless when disaster strikes. The jokers we pay to fix our stuff have no clue what they're doing, ...
  continue reading
 
Artwork
 
A show that brings you closer to the cutting edge in computer architecture and the remarkable people behind it. Hosted by Dr. Suvinay Subramanian, who is a computer architect at Google in the Systems Infrastructure group, working on designing Google’s machine learning accelerators (TPU), and Dr. Lisa Hsu who is semi-retired and works part-time in Reality Labs Research at Meta on optics and display technologies for AR.
  continue reading
 
Artwork
 
Luchtig, laagdrempelig, leuk en informatief. Dat is de Computer Idee Podcast. Wil je in begrijpelijk Nederlands op de hoogte blijven van de nieuwste ontwikkelingen en mogelijkheden binnen de digitale samenleving, dan is deze podcast echt iets voor jou!
  continue reading
 
Artwork

1
I Love Computering

I Love Computering

icon
Unsubscribe
icon
icon
Unsubscribe
icon
חודשי
 
Welcome to I Love Computering, where I share lessons I learned from doing things on computers. Cover art photo provided by Rachel Moenning on Unsplash: https://unsplash.com/@racheldeanne
  continue reading
 
Artwork
 
A tidal wave of computer vision innovation is quickly having an impact on everyone's lives, but not everyone has the time to sit down and read through a bunch of news articles and learn what it means for them. In Computer Vision Decoded, we sit down with Jared Heinly, the Chief Scientist at EveryPoint, to discuss topics in today’s quickly evolving world of computer vision and decode what they mean for you. If you want to be sure you understand everything happening in the world of computer vi ...
  continue reading
 
Loading …
show series
 
Tonight on CEP! Another Torment-a-Scammer Medley! One scammer noticed my number and hung up immediately. Another hung up when she heard Foghorn. I have a feeling they're on to me and have me flagged in the Secret Scammer Database. Apple impostor calls me up and says I have a problem with Apple Pay... It was a CLASSIC support scam where they told me…
  continue reading
 
We start this ep by discussing how social media completely redefined Charlie Kirk's life and death through the use of "Kirkification" edits. Then we take a more serious look at the "Grieftech" industry-- people who want to revive the dead in the form of AI for profit. Patreon.com/KillTheComputerעל ידי [email protected]
  continue reading
 
This week, we kick off the holiday season with a little Thanksgiving talk — and a big reminder to stay sharp. From new scam tactics targeting holiday shoppers to the surprising bioengineering controversy stirring up Campbell's Soup fans, there's plenty to unpack. We'll also walk through what to do immediately if you get one of those dreaded "data s…
  continue reading
 
Using AI to cook a turkey! Crypto Assoc vote has to be re-done thanks to lost encryption keys, FBI says 250Million in Fraud do to Bank Phishing Fraud, I keep getting calls about Viruses on my computer….scam! Alexa AI Talk, Robo calls use SIT, Vendor Tech support getting scammed, Win 10 to Win 11 or do I use the ESU? UK OFCOM want’s to know if you a…
  continue reading
 
This week's full broadcast of Computer Talk Radio includes - 00:00 - Gearing up for CyberMonday - Benjamin skips the news and covers tips for CyberMonday - 11:00 - Listener Q&A - external monitors - Benjamin explains concerns for Suzanna and external monitors - 22:00 - Shadovitz on Smart Watches - Deb Shadovitz steps in to give thoughts about smart…
  continue reading
 
Imagine doing tech research… but from outside the tech industry? What an idea… More like this: Nodestar: Turning Networks into Knowledge w/ Andrew Trask So much of tech research happens within the tech industry itself, because it requires data access, funding, and compute. But what the tech industry has in resources, it lacks in independence, scrup…
  continue reading
 
Digitale Dienstleistungen und Angebote sind aus dem Alltag nicht mehr wegzudenken. Von reiner Informationsvermittlung bis zur KI-Interaktion: Das Web ist unser ständiger Begleiter. Was aber tun all jene Menschen, die aufgrund von körperlichen oder geistigen Beeinträchtigungen nur bedingt oder im schlimmsten Fall gar nicht am Netz teilhaben können?D…
  continue reading
 
Heb je wel gehoord van de zeven, de zeven, heb je wel gehoord van de zevensprong? Blijkbaar is het maar een zessprong, maar doe hij zich online beter voor dan hij in werkelijkheid is. Typisch mannen. Of het was niet express, al hoop ik dan wel dat hij daartegen verzekerd is. Een ongeluk zit soms in een klein promptje!Welkom in Computer Club, een po…
  continue reading
 
In the News Recommend You Do Not Buy Your Kid an AI Toy for Christmas AI-Powered Toys are Unregulated Apple Cuts App Store Commission to 15% for Mini App Developers Chinese Hackers Successfully Used Anthropic's AI for Cyber Espionage Anthropic CEO on AI Disruption: Entry-Level Jobs at Risk ITPro Series with Benjamin Rockwell Looking for a Good Resu…
  continue reading
 
Interplay co-founder Rebecca Heineman dies aged 62, Xbox Partner Preview, Steam Machines, the internet thinks Half-Life 3 is being announced this month, and Xbox is reportedly warning of yet another potential price increase. Also: Switch mouse controls, Perfect For Portal, Goated sauce, Outer Worlds 2, Steam Deck, mechanical keyboards, and more! GA…
  continue reading
 
Digitale Dienstleistungen und Angebote sind aus dem Alltag nicht mehr wegzudenken. Von reiner Informationsvermittlung bis zur KI-Interaktion: Das Web ist unser ständiger Begleiter. Was aber tun all jene Menschen, die aufgrund von körperlichen oder geistigen Beeinträchtigungen nur bedingt oder im schlimmsten Fall gar nicht am Netz teilhaben können?D…
  continue reading
 
Digitale Dienstleistungen und Angebote sind aus dem Alltag nicht mehr wegzudenken. Von reiner Informationsvermittlung bis zur KI-Interaktion: Das Web ist unser ständiger Begleiter. Was aber tun all jene Menschen, die aufgrund von körperlichen oder geistigen Beeinträchtigungen nur bedingt oder im schlimmsten Fall gar nicht am Netz teilhaben können?D…
  continue reading
 
Digitale Dienstleistungen und Angebote sind aus dem Alltag nicht mehr wegzudenken. Von reiner Informationsvermittlung bis zur KI-Interaktion: Das Web ist unser ständiger Begleiter. Was aber tun all jene Menschen, die aufgrund von körperlichen oder geistigen Beeinträchtigungen nur bedingt oder im schlimmsten Fall gar nicht am Netz teilhaben können?D…
  continue reading
 
AI's boom might be racing toward a dead end as today's LLMs look more like vacuum tubes than world-changers. In this episode of The Valley Current®, Jack Russo and former Apple executive Russ Irwin break down why AI is rapidly becoming a commodity and why the real power will shift to industry-specific systems built on the private data companies alr…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deעל ידי Torsten Gigler
  continue reading
 
Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deעל ידי Torsten Gigler
  continue reading
 
Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deעל ידי Torsten Gigler
  continue reading
 
Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deעל ידי Torsten Gigler
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
Loading …

מדריך עזר מהיר

האזן לתוכנית הזו בזמן שאתה חוקר
הפעלה