Fuzzing, Time Series, Unix 1ed, and Failing
The O’Reilly Data Show Podcast: Neha Narkhede on data integration, microservices, and Kafka’s roadmap.
The O’Reilly Security Podcast: Aligning security objectives with business objectives, and how to approach evaluation and development of a security program.
Several new apps are making it easier for doctors and patients to conduct clinical trials.
Decision-making, Code Duplication, Container Security, and Information vs Attention
Learn how NATS requests work and how to use the context package for cancellation.
Storytelling, Decompilation, Face Detection, and Dependency Alerts
Ancient Data, Tech Ethics, Session Replay, and Cache Filesystem
Interactive Marginalia, In-Person Interactions, Welcoming Groups, and Systems Challenges
Regulate IoT, Visualize CRISPR, Distract Strategically, and Code Together
Analytical frameworks come with an entire ecosystem.
How messages help you decouple, test, and re-use your software’s code.
The O’Reilly Programming Podcast: The skills needed to make the move from developer to architect.
Service virtualization brings a lightweight, automatable means of simulating external dependencies.
Learn how the NATS client implements fast publishing and messages processing schemes viable for production use.
Paywalled Research, Reproducing AI Research, Spy Teardown, and Peer-to-Peer Misinformation
How user-centered design focused on user needs and delivery can bring about real change and still be respected in the boardroom.
Structured bindings, new library types, and containers add efficiency and readability to your code.
AI Microscope, Android Geriatrics, Doxing Research, and Anti-Goals
Software 2.0, Watson Walkback, Robot Fish, and Smartphone Data
Drawing parallels and distinctions around neural networks, data sets, and hardware.
Syntactic Sugar, Surprise Camera, AI Models, and Git Recovery
The O’Reilly Data Show Podcast: David Talby on a new NLP library for Spark, and why model development starts after a model gets deployed to production.
Culture, Identifying Bots, Attention Economy, and Machine Bias
Lessons from the Dyn DNS DDoS.
Learn what makes for a rich emotional experience and why, even if we make our technology invisible, the connection will still be emotional.
Analyzing tweets and posts around Trump, Russia, and the NFL using information entropy, network analysis, and community detection algorithms.
Learn useful Go communication techniques from the internals of the NATS client.
CGMs are unique in the way consumers have taken it upon themselves to create modifications to medical devices.
The O’Reilly Security Podcast: Recruiting and building future open source maintainers, how speed and security aren’t mutually exclusive, and identifying and defining first principles for security.
Shadow Profiles, Theories of Learning, Feature Visualization, and Time to Reflect Reality
Reduce troubleshooting time from days to seconds.
The architectural design, automated quality assurance, and deployment skills needed for delivering continuous software.
Disturbing YouTube, Sketchy Presentation Tool, Yammer UI, and Dance Your Ph.D. Winners
The IBM team encourages developers to ask tough questions, be patient, and be ready to fail gracefully.
IoT Standard, Probabilistic Programming, Go Scripting, and Front-End Checklist
End of Startups, Company Strategy, Complex Futures, and Bitcoin Energy
How vision, mission, and values help you craft a winning product roadmap.
The O’Reilly Programming Podcast: Applying architectural patterns and pattern languages to build systems for the cloud.
How to build and train a DCGAN to generate images of faces, using a Jupyter Notebook and TensorFlow.
How software architects can balance technical proficiencies with an appropriate mastery of communication.
Capsule Neural Networks, Adversarial Objects, Deep Learning Language, and Crowdsourced Pop Star
Runa Sandvik shares practical lessons on how to build and foster a culture of security across an organization.
Window Snyder says security basics are hard to implement consistently, but they're worth the effort.
The O’Reilly Defender Awards celebrate those who have demonstrated exceptional leadership, creativity, and collaboration in the defensive security field.
Multi-model database architectures provide a flexible data governance platform
The FDA is entering a new era of regulation as whole genome sequencing becomes more accessible to consumers.
Crypto Docs, Ultrasound, Anti-Innovation Investors, and IoT Security
Fredrick Lee shines a light on the ways security can be allowed into the world to do more.
Chris Wysopal explains how defenders can help developers create secure software through coaching, shared code, and services.
Matt Stine looks at three principles of cloud-native security and explains an approach that addresses the increasing volume and velocity of threats.
Katie Moussouris explains how to turn the forces that resist defense activities into the biggest supporters.
Watch highlights covering security, defense, culture, and more. From the O'Reilly Security Conference in New York 2017.
Haroon Meer says a new type of security engineering is taking root, which suggests hope for effective corporate security at enterprise scale.
The convergence of big data, artificial intelligence, and business intelligence
AI for Databases, One-Pixel Attacks, Adtech Uncanny Valley, and Mindreading Video
README Maturity Model, Open Source Project Maturity Model, Walmart Robots, and Sparse Array Database
Gentle PR, Readable Arxiv, Sentiment Bias, and AI Coding from Sketches
Value propositions are a dime a dozen. Learn how to choose the ones that work.
Identify the options available to develop an effective immersive experience.