Computer 공개
[search 0]
Download the App!
show episodes
 
Artwork
 
Jeden Samstag das Neueste aus Computertechnik und Informationstechnologie. Beiträge, Reportagen und Interviews zu IT-Sicherheit, Informatik, Datenschutz, Smartphones, Cloud-Computing und IT-Politik. Die Trends der IT werden kompakt und informativ zusammengefasst.
  continue reading
 
Artwork
 
Die Redaktion von ComputerBase diskutiert im CB-Funk ganz ohne Gebrüll aktuelle Themen und gewährt Einblicke hinter die Kulissen: Warum hat die Redaktion wie berichtet oder getestet, was steht an, oder wo klemmt es? Wer sich schon immer gefragt hat, wie es in den Köpfen hinter ComputerBase tickt, ist hier genau richtig. Feedback, Vorschläge und Wünsche zum Podcast sind jederzeit gerne gesehen.
  continue reading
 
Artwork

1
Computer Club

Computer Club - Freddy & Smollie

icon
Unsubscribe
icon
icon
Unsubscribe
icon
주마다
 
Welkom in Computer Club, een podcast door Frederik 'Freddy' De Bosschere en Thomas 'Smollie' Smolders! Wekelijks bespreken we de actualiteit op vlak van technologie en gaan we op zoek naar interessante feiten en innovaties. Er zijn ook jingles.
  continue reading
 
Artwork

1
Computertechnik Waide

Computertechnik Waide

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매일+
 
Computertechnik Waide – eine Marke der Kleffmann Media GmbH – ist Ihr regionaler Ansprechpartner für modernes IT-Consulting und professionelles IT-Outsourcing. Seit über 40 Jahren begleiten wir Unternehmen jeder Größe dabei, ihre IT effizienter und zukunftssicher zu gestalten. Neben klassischer Infrastrukturberatung unterstützen wir bei der Einführung von KI-Lösungen und Automatisierungstechnologien, um Prozesse zu optimieren und Wettbewerbsvorteile zu sichern.
  continue reading
 
Computerlaw Group LLP (www.computerlaw.com) provides strategic, knowledgeable, and effective business and intellectual property protection, licensing and litigation services to Internet, e-commerce, computer software, hardware and other high-tech businesses, teams and industry professionals throughout California, nationally and around the world. CLG produces THE VALLEY CURRENT as a way to keep its worldwide clients, co-counsels, colleagues, and friends aware of developments in Silicon Valley ...
  continue reading
 
The Computer Game Show is a weekly podcast about computer games, hosted by David Turner, Sean Bell, Mat Murray and James Farley. Listen every Wednesday on Apple Podcasts, Google Podcasts, Spotify and YouTube. Email [email protected] or visit tcgs.co to stream every episode, watch our Twitch streams, contact the show and more. Get exclusive content and more by supporting TCGS on Patreon at patreon.com/tcgs
  continue reading
 
Technology is changing fast. And it's changing our world even faster. Host Alix Dunn interviews visionaries, researchers, and technologists working in the public interest to help you keep up. Step outside the hype and explore the possibilities, problems, and politics of technology. We publish weekly.
  continue reading
 
The Computer Corner Radio Show with Gene Mitchell and Joe Myshko is on the air every Saturday morning from 8:00AM to 9:30AM. The Computer Corner show now airs on WCHE 1520. The show formerly aired on WCOJ 1420 in Chester County, PA. The Show is celebrating over 14 years.
  continue reading
 
Since 1995, Computer Talk with TAB has been on the air live each week providing an in-depth practical view of computers and their place in our everyday lives. A Computer Radio Program for everyone! Erik Semmel from TAB Computer Systems hosts the show and provides real time answers to caller’s questions. To keep the topics fresh and informative, guests are brought in as a result of listener’s questions and suggestions. The show is geared towards the everyday computer user with questions about ...
  continue reading
 
Artwork

1
Computer and Technology Radio

Marsha Collier and Marc Cohen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달+
 
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: [email protected] Twitter #techradio @MarshaCollier & @realmarccohen
  continue reading
 
Artwork

1
Computer Talk Radio

Benjamin Rockwell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
Computer Talk Radio is a nationally syndicated broadcast radio program on computers and technology, and how they impact your life. Benjamin Rockwell, the show host and a computer nerd, leads the team as the expert guide through the technical jungle of jargon, and the valleys of viruses, to reach the pinnacle of power over your computer problems. Benjamin is joined by multiple team members who thrive on bringing you to the next level of knowledge. Keith M. Sedor has been a Certified Apple Mac ...
  continue reading
 
Artwork

1
Computeren

Samya Hafsaoui, Timo Harmelink, Marieke Kuypers & Spraakmaker Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달+
 
In de podcast Computeren nemen chronisch online journalisten Samya Hafsaoui, Marieke Kuypers en Timo Harmelink je wekelijks mee door de diepste krochten van het internet. We praten je bij over de memes, drama’s, en discussies die je móét kennen om o
  continue reading
 
Artwork

1
Das Computermagazin

Bayerischer Rundfunk

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
Neue Produkte und Trends aus Computertechnik und Telekommunikation: Was bringen uns die neuen Technologien? Was gibt es Spannendes im Netz? Eine Orientierung im Dschungel der Bits und Bytes. "Das Computermagazin" - Ein gemeinsames Magazin der Redaktionen Wissenschaft, Wirtschaft und Zündfunk.
  continue reading
 
A show that brings you closer to the cutting edge in computer architecture and the remarkable people behind it. Hosted by Dr. Suvinay Subramanian, who is a computer architect at Google in the Systems Infrastructure group, working on designing Google’s machine learning accelerators (TPU), and Dr. Lisa Hsu who is semi-retired and works part-time in Reality Labs Research at Meta on optics and display technologies for AR.
  continue reading
 
Artwork
 
We're increasingly dependent on technology. Our business and personal lives rely on it, but as you've probably noticed, it's unreliable.They promise it'll get better, but it usually gets worse. Our computers are slow, so we end up squinting at smartphones. We live in constant fear that something's going to happen to our personal data. So we're scared into paying for fake protection that proves useless when disaster strikes. The jokers we pay to fix our stuff have no clue what they're doing, ...
  continue reading
 
Luchtig, laagdrempelig, leuk en informatief. Dat is de Computer Idee Podcast. Wil je in begrijpelijk Nederlands op de hoogte blijven van de nieuwste ontwikkelingen en mogelijkheden binnen de digitale samenleving, dan is deze podcast echt iets voor jou!
  continue reading
 
Artwork

1
I Love Computering

I Love Computering

icon
Unsubscribe
icon
icon
Unsubscribe
icon
매달
 
Welcome to I Love Computering, where I share lessons I learned from doing things on computers. Cover art photo provided by Rachel Moenning on Unsplash: https://unsplash.com/@racheldeanne
  continue reading
 
A tidal wave of computer vision innovation is quickly having an impact on everyone's lives, but not everyone has the time to sit down and read through a bunch of news articles and learn what it means for them. In Computer Vision Decoded, we sit down with Jared Heinly, the Chief Scientist at EveryPoint, to discuss topics in today’s quickly evolving world of computer vision and decode what they mean for you. If you want to be sure you understand everything happening in the world of computer vi ...
  continue reading
 
Loading …
show series
 
In the News Recommend You Do Not Buy Your Kid an AI Toy for Christmas AI-Powered Toys are Unregulated Apple Cuts App Store Commission to 15% for Mini App Developers Chinese Hackers Successfully Used Anthropic's AI for Cyber Espionage Anthropic CEO on AI Disruption: Entry-Level Jobs at Risk ITPro Series with Benjamin Rockwell Looking for a Good Resu…
  continue reading
 
Interplay co-founder Rebecca Heineman dies aged 62, Xbox Partner Preview, Steam Machines, the internet thinks Half-Life 3 is being announced this month, and Xbox is reportedly warning of yet another potential price increase. Also: Switch mouse controls, Perfect For Portal, Goated sauce, Outer Worlds 2, Steam Deck, mechanical keyboards, and more! GA…
  continue reading
 
This week we're digging into some handy new tech tricks and a few places where you might want to pump the brakes. We talk about Google letting you AirDrop between iPhone and Pixel 10, what's really changing with AppleTV plans at T-Mobile, and Apple's limited-edition accessory that's already creating buzz. But we also take a smart look at digital dr…
  continue reading
 
The original plan was for Jeremy to join us to finish some of the news articles from last ep, but instead turned into a loose form discussion on some of the horrifying ways tech companies are profiting off of our isolation. Support Jeremy at Patreon.com/Quorators저자 [email protected]
  continue reading
 
This week's full broadcast of Computer Talk Radio includes - 00:00 - Tech news for non-nerds - Jeep, AI, Google, Microsoft, Cloudflare, astronaut, Black Friday - 11:00 - Dr Doreen Galli - F1 in Las Vegas - Dr Doreen Galli expresses excitement for F1 racing in Vegas - 22:00 - Apple form factors - Keith talks about Mac Pro and form factor changes in …
  continue reading
 
Governments around the world are using predictive systems to manage engagement with even the most vulnerable. Results are mixed. More like this: Algorithmically Cutting Benefits w/ Kevin De Liban Luckily people like Soizic Pénicaud are working to prevent the modern welfare state from becoming a web of punishment of the most marginalised. Soizic has…
  continue reading
 
Was er maar zoiets als een digitale praatstok. Een stuk hout dat je moet doorgeven, en enkel wie het vastheeft mag het woord nemen. Zo ziet iedereen dat je su-wat? Nu al? Maar ik ging net iets vertellen over mijn fantastische zeepbellenmachine die ik vorige week gekocht heb. Als je er Super Power Dreft in doet kan hij e-maar hé ik heb de stok nog v…
  continue reading
 
Dr. Mike joins us for the ten thousand download celebration! The industry is realizing what Marc's been saying for years: Storing your passwords in your browser is an excellent way to hand them to bad guys. Microsoft was apparently nostalgic for Y2K: This week's Outlook flaw was a Y2K22 bug that couldn't handle emails dated 2022! MS Word spellcheck…
  continue reading
 
AI's boom might be racing toward a dead end as today's LLMs look more like vacuum tubes than world-changers. In this episode of The Valley Current®, Jack Russo and former Apple executive Russ Irwin break down why AI is rapidly becoming a commodity and why the real power will shift to industry-specific systems built on the private data companies alr…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
  continue reading
 
Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
  continue reading
 
mit Fabian und Jan Black Ops 7: Die Community jagt FPS im neuen Call of Dutyhttps://www.computerbase.de/artikel/gaming/call-of-duty-black-ops-7-community-benchmark.95087/ Community-Benchmark: Wie läuft Anno 117: Pax Romana auf deinem System?https://www.computerbase.de/artikel/gaming/anno-117-pax-romana-community-benchmark.94927/ Corsair Air 5400 im…
  continue reading
 
Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
  continue reading
 
We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
  continue reading
 
We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
  continue reading
 
We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
  continue reading
 
We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
  continue reading
 
Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
  continue reading
 
Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
  continue reading
 
Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
  continue reading
 
Loading …

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생