Best Computer Science Podcasts (2025)
show episodes
 
Artwork
 
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
  continue reading
 
Hey guys, welcome to NetworkChuck!! I love IT, Networks, VoIP, Security, Python..........IT's AWESOME!!! But my passion is helping people get started on this incredible career path. I make videos that help you get started in IT and keep you motivated along the way as you pursue GREATNESS. *****Want to help me create more videos? Hit me up on Patreon: https://patreon.com/networkchuck
  continue reading
 
Artwork

1
ACM ByteCast

Association for Computing Machinery (ACM)

Unsubscribe
Unsubscribe
Monthly
 
ACM ByteCast is a podcast series from ACM’s Practitioners Board in which hosts Rashmi Mohan and Jessica Bell interview researchers, practitioners, and innovators who are at the intersection of computing research and practice. In each episode, guests will share their experiences, the lessons they’ve learned, and their own visions for the future of computing.
  continue reading
 
Have you ever been curious on how a computer science/software engineering major might be like? As a student of the Costa Rica Institute of Technology, I'll hand you my reviews, tips, and experiences regarding the courses any aspiring computer scientist or software engineer must take in order to graduate. ITCR's curriculum is mainly influenced by the ACM guidelines. Contact: [email protected] https://www.facebook.com/CSSECCR/
  continue reading
 
Artwork

1
Theory and Practice

GV (Google Ventures)

Unsubscribe
Unsubscribe
Monthly
 
Season 4 will explore one of humanity's most rapidly advancing and impactful changes: what does it mean to be human in the age of AI when computers and robots are accomplishing more human functions? How will AI with human-level skills influence us and enhance the world around us? How will we change AI, and how will it change us? Theory and Practice opens the doors to the cutting edge of biology and computer science through conversations with leaders in the field. The podcast is hosted by Ant ...
  continue reading
 
An exciting new podcast from the National Centre for Computing Education in England. Each month, you get to hear from a range of experts, teachers, and educators from other settings as they discuss with us key issues, approaches, and challenges related to teaching computing in the classroom.
  continue reading
 
Artwork

1
Codexpanse Podcast

Rakhim Davletkaliyev

Unsubscribe
Unsubscribe
Monthly
 
The Universe is computable. Information is its fundamental property, along with space and time. Computer science is a young field, but we didn't invent computing, we've discovered it. Codexpanse explores the computing nature of reality, ideas of programming and math, and our role in this exciting world.
  continue reading
 
Loading …
show series
 
Today’s topic is the default gateway, essential for routing traffic between networks. We explain its purpose, configuration, and the consequences of incorrect settings. Using home networks as an example, Ethan and Holly illustrate how default gateways enable devices to communicate with external networks. The discussion also covers routing tables, s…
  continue reading
 
OFDMA, or Orthogonal Frequency-Division Multiple Access, was introduced in 802.11ax. This technology allows a radio to split a single channel into multiple sub-carriers, which in turn can be used to send data to multiple devices at the same time. OFDMA is meant to reduce congestion by allowing APs to allocate resource units among, and communicate..…
  continue reading
 
Measuring network speed seems straightforward: send some traffic between two endpoints and see how long it took. But what path did the traffic take? Were wired or wireless networks involved? What intermediary devices stood between your two endpoints? Was there interference? Congestion? Are device limitations affecting your results? The fact is, the…
  continue reading
 
Once you get past a handful of Python scripts, network automation can be…daunting. If you want to make network automation process-driven, repeatable, reliable, and something that doesn’t just rely on your scripts and the knowledge inside your head, there’s an entire landscape that opens up before you. Have you thought about network discovery? How a…
  continue reading
 
In this end of-the-year episode of IPv6 Buzz, we review the significant developments in IPv6 throughout 2024 and share projections for 2025. We discuss the introduction of a new documentation prefix, analyze IPv6 usage statistics, and review No NAT November. For 2025, we explore the possibilities of updates to RFC 6724 and global adoption of... Rea…
  continue reading
 
On today’s episode, we’re going to talk Python. Host Eric Chou is joined by Michael Kennedy, the founder of Talk Python Training and host of the Talk Python To Me podcast. The discussion covers the evolution of Michael’s podcast and training business, the impact of platforms like TikTok on learning, and the importance of community... Read more »…
  continue reading
 
Join us today for a look back at this year’s developments in cloud security and DevOps. We ask if serverless computing has peaked, why Kubernetes continues to be so hard, whether cloud repatriation is a real trend, and whether the DevOps role has become too darn big. We also explore the future of cloud computing,... Read more »…
  continue reading
 
Recent events have driven home a simple fact: neither your devices nor your network services can be trusted totally, and they could all be turned against you, possibly fatally. Join us as we discuss the harsh realities of the evolving cybersecurity space, and how enterprise leaders in and out of IT need to change their... Read more »…
  continue reading
 
Autonomous Digital Experience Management, or ADEM, measures network and application performance from the user perspective and gives network and IT teams visibility into the entire data path—including the home user network, first mile and last mile, and the WAN. On today’s Packet Protector, we learn how ADEM can complement your network and security …
  continue reading
 
In this episode of ACM ByteCast, Bruke Kifle hosts ACM Fellow Roger Dannenberg, a Professor Emeritus of Computer Science, Art & Music at Carnegie Mellon University. Dannenberg is internationally renowned for his research in computer music, particularly in the areas of programming language design, real-time interactive systems, and AI music. Through…
  continue reading
 
Take a Network Break! This is our final show for 2024. We start with critical vulnerabilities in Ivanti and OpenWrt, and then discuss what effect a proposed bill from US Senator Ron Wyden would have on telecom security (short answer: more paperwork but unlikely to improve protection). Extreme Networks announces a new AI platform that... Read more »…
  continue reading
 
Take a Network Break! This is our final show for 2024. We start with critical vulnerabilities in Ivanti and OpenWrt, and then discuss what effect a proposed bill from US Senator Ron Wyden would have on telecom security (short answer: more paperwork but unlikely to improve protection). Extreme Networks announces a new AI platform that... Read more »…
  continue reading
 
When building your network and buying equipment, is performance or cost more important? On today’s episode, we discuss the balance between performance and cost in selecting networking equipment. We also cover other considerations, including why you should understand client and network needs, the fluid nature of pricing, and the necessity of creativ…
  continue reading
 
Ever wonder how large conferences such as Cisco Live! manage their on-site network operations? Today’s podcast guest, Jason Davis joins host Scott Robohn to discuss history of network operations at Cisco Live!, and the intricacies, challenges, and strategies involved in setting up and managing network operations for such a large event. Episode Gues…
  continue reading
 
Today’s Heavy Networking comes to you from the AutoCon2 tech event being held in Westminster, Colorado. This episode was recorded in conference room on site at AutoCon2 in November, 2024. The format? Roundtable. Four network automators have raised their hand and brought topics they want to discuss. Those topics include: Crafting tools to “listen” t…
  continue reading
 
A growth mindset not only advances you, but can help to advance those around you. Today we delve into the concept of a growth mindset with guest Sasha Czarkowski. We contrast the growth mindset with a fixed mindset, highlighting the latter’s detrimental effects on creativity and learning. The discussion also highlights the importance of psychologic…
  continue reading
 
Packet analysis can be your friend for troubleshooting network problems. In this episode, hosts Ethan Banks and Holly Metlitzky explore packet analysis, They discuss tools such as Wireshark and Tcpdump, explain their functionalities, and talk about the importance of filtering data for effective analysis. Listeners are encouraged to engage with Wire…
  continue reading
 
Humor is the best medicine, so they say. In critical IT security jobs, a little humor could help you prevent burnout and maintain your mental equilibrium. Lydia Graslie, a Cloud Threat Detection Engineer at Edward Jones, shares her insights on the complexities of cloud security and the challenges posed by modern cloud platforms, as well... Read mor…
  continue reading
 
A Chief Information Security Officer (CISO) helps to architect and drive an organization’s security strategy. The role requires technical chops and business acumen. You also need strong communication skills to help executives understand risk and response, choose the right metrics to measure infosec effectiveness, and provide guidance to the technic…
  continue reading
 
In this episode of the Heavy Wireless podcast, host Keith Parsons interviews Brian Tuttle, co-founder of MetaGeek. Brian recounts the company’s origins, starting with the development of the WiSpy spectrum analyzer, and highlights key products like inSSIDer and Chanalyzer. The discussion covers MetaGeek’s mission to visualize wireless landscapes, th…
  continue reading
 
Today on the Tech Bytes podcast, sponsored by Fortinet, we talk about IoT and OT risks and how to mitigate them. One option from Fortinet is FortiLink NAC, a free feature that can help you segment and protect IoT and OT devices and can even help deploy virtual patches. Another option is FortiNAC, a full-bore... Read more »…
  continue reading
 
Take a Network Break! This week we warn of significant vulnerabilities in WhatsUp Gold and Cisco NX-OS. We also discuss US federal reaction to the penetration of US telco networks by Chinese state actors. These reactions include network and visibility hardening guidelines from CISA, the FBI (reluctantly) recommending the use of encrypted messaging …
  continue reading
 
Take a Network Break! This week we warn of significant vulnerabilities in WhatsUp Gold and Cisco NX-OS. We also discuss US federal reaction to the penetration of US telco networks by Chinese state actors. These reactions include network and visibility hardening guidelines from CISA, the FBI (reluctantly) recommending the use of encrypted messaging …
  continue reading
 
On today’s show, we recap some highlights of AutoCon2 with guest Jeremy Rossbach from sponsor Broadcom. Jeremy gives some background on his career, and then elaborates on conversations he had at AutoCon2. He also shares observations on the present and future of network automation, which include AI and robust observability solutions that integrate w…
  continue reading
 
Today on Heavy Networking, sponsored by Palo Alto Networks, we explore how virtual patching can be used to protect IoT and OT devices. Virtual patching leverages intrusion detection and intrusion prevention, combined with threat research, to block exploits targeting IoT and OT devices. Why would you use virtual patching? When it comes to IoT and...…
  continue reading
 
Continuing the IPv6 Basics series, today’s podcast addresses IPv6 address planning. Special “guest” Tom Coffeen who literally wrote the book, IPv6 Address Planning, helps answer questions and gives advice on how to effectively plan IPv6 addresses. We discuss topics such as the importance of long-term planning and understanding prefix sizes, common …
  continue reading
 
Network engineers should be familiar with the Open Systems Interconnection (OSI) model, a framework for understanding network communications. On today’s show, Ethan and Holly delve into each of the model’s seven layers to discuss their functions, associated protocols, and practical implications for modern networking. They also talk about how the OS…
  continue reading
 
Ongoing education and training is a constant in a networking career, especially if you want to advance. And certifications are a common path forward. On today’s episode, guest Andreas Baekdahl shares his journey from traditional networking to automation architect and certification instructor. Along the way, he’s had his share of challenges and fail…
  continue reading
 
Public cloud networks can be a bit of a black box when it comes to monitoring and troubleshooting. Today on Day Two DevOps we talk with sponsor Cisco ThousandEyes about its Cloud Insights tool, which aims to open that box so you can see exactly what’s going on in your cloud networks, identify problems, help... Read more »…
  continue reading
 
Our monthly news roundup discusses liability insurance for CISOs (if you are one, you should get it), serious intrusions of US telecom companies by Chinese state actors (according to the FBI), and a novel attack that leapt across multiple Wi-Fi networks. We also discuss significant vulnerabilities affecting Palo Alto Networks’ Expedition migration …
  continue reading
 
This has been a big year for AI regulation, from the EU AI Act to the much hyped California SB1047, currently in limbo. With things bubbling along across the country, and at the federal level, and internationally, there’s a lot going on and IT folks should be keeping current and planning to meet a changing... Read more »…
  continue reading
 
Take a Network Break! We’ve got a full menu for our post-Thanksgiving episode. We start with a host of critical CVEs affecting Veritas and a couple more for QNAP. Cisco announces EOL for two version of its ACI software, Verizon runs field trials for 1.6Tbps throughput in a single wavelength (with Ciena optical transceivers), and... Read more »…
  continue reading
 
Take a Network Break! We’ve got a full menu for our post-Thanksgiving episode. We start with a host of critical CVEs affecting Veritas and a couple more for QNAP. Cisco announces EOL for two version of its ACI software, Verizon runs field trials for 1.6Tbps throughput in a single wavelength (with Ciena optical transceivers), and... Read more »…
  continue reading
 
System Initiative is a new product that aims to improve on Infrastructure as Code (IaC). On today’s episode we talk with System Initiative creator Adam Jacob to find out why he wanted to improve on IaC, how System Initiative works, how it compares to other platforms in the market, how it handles key features such... Read more »…
  continue reading
 
Loading …