79 episodes

Podcast for developers, testers, SREs... and their managers. I explain complex and convoluted technologies in a clear way, avoiding buzzwords and hype. Never longer than 4 minutes and 16 seconds. Because software development does not require hours of lectures, dev advocates' slide decks and hand waving. For those of you, who want to combat FOMO, while brushing your teeth. 256 seconds is plenty of time. If I can't explain something within this time frame, it's either too complex, or I don't understand it myself.

By Tomasz Nurkiewicz. Java Champion, CTO, trainer, O'Reilly author, blogger

Around IT in 256 seconds Tomasz Nurkiewicz

    • Technology

Podcast for developers, testers, SREs... and their managers. I explain complex and convoluted technologies in a clear way, avoiding buzzwords and hype. Never longer than 4 minutes and 16 seconds. Because software development does not require hours of lectures, dev advocates' slide decks and hand waving. For those of you, who want to combat FOMO, while brushing your teeth. 256 seconds is plenty of time. If I can't explain something within this time frame, it's either too complex, or I don't understand it myself.

By Tomasz Nurkiewicz. Java Champion, CTO, trainer, O'Reilly author, blogger

    #78: Stuxnet: computer virus that you can admire

    #78: Stuxnet: computer virus that you can admire

    Stuxnet was probably one of the most sophisticated pieces of software
    ever built. I can easily imagine a Hollywood movie about it. A computer
    program that could change the course of history. Ironically, Stuxnet was
    a computer virus. A virus that infected 200 thousand machines. But
    activated and damaged only on a fraction of that.

    Read more: https://nurkiewicz.com/78

    Get the new episode straight to your mailbox: https://nurkiewicz.com/newsletter

    • 4 min
    #77: DDoS: take down a server, one request at a time

    #77: DDoS: take down a server, one request at a time

    Denial-of-service attack tries to take down a server by sending
    specially-crafted requests. The simplest form of this attack is just
    sending a lot of requests in a short period of time. But more
    sophisticated methods are possible. For example, sending a single
    unusual request that overwhelms the server. One such example is a ZIP
    bomb, that I’ll explain later. But the most widespread technique
    requires a large number of attacking servers. Also known as distributed
    denial-of-service. DDoS for short.

    Read more: https://nurkiewicz.com/77

    Get the new episode straight to your mailbox: https://nurkiewicz.com/newsletter

    • 4 min
    #76: 12th Factor App: portable and resilient services start here. Part 8-12/12

    #76: 12th Factor App: portable and resilient services start here. Part 8-12/12

    In part 2 of the Twelve-Factor App, we’ll explore the second half of
    the principles. Be sure to listen to the previous episode as well. We
    still have only four minutes, so let’s go!

    Read more: https://nurkiewicz.com/76

    Get the new episode straight to your mailbox: https://nurkiewicz.com/newsletter

    • 4 min
    #75: 12th Factor App: portable and resilient services start here. Part 1-7/12

    #75: 12th Factor App: portable and resilient services start here. Part 1-7/12

    Twelve-Factor App is a set of design guidelines defined by Heroku.
    These guidelines are best suited for cloud-native, portable and
    resilient services. In this episode, I’ll explain the first seven
    principles. I have four minutes left, so let’s go!

    Read more: https://nurkiewicz.com/75

    Get the new episode straight to your mailbox: https://nurkiewicz.com/newsletter

    • 4 min
    #74: SOAP: (not really) Simple Object Access Protocol

    #74: SOAP: (not really) Simple Object Access Protocol

    SOAP, formerly known as Simple Object Access Protocol, is a messaging
    standard. SOAP is very broad and general. Technically, it can support
    request-response, as well as fire-and-forget communication. The
    underlying protocol is typically HTTP, but there’s nothing against using
    message brokers. Or even good old SMTP. You know, the one for exchanging
    e-mails. The communication happens through XML messages. These messages
    are well-defined and structured. XML schema is agreed upon before any
    communication.

    Read more: https://nurkiewicz.com/74

    Get the new episode straight to your mailbox: https://nurkiewicz.com/newsletter

    • 4 min
    #73: Neo4j: all your data as a graph?

    #73: Neo4j: all your data as a graph?

    Neo4j is a NoSQL database engine. What makes it different is the
    unusual data model. In Neo4j everything is modelled as a graph. A graph
    is a collection of nodes connected with edges. A typical example is a
    graph of friends on a social media website. Or a network of movies and
    actors. But it turns out many problems can be efficiently modelled as
    graphs. Like a customer having orders, each order has items. Or
    insurance, connected to a certain car and an accident. So what makes
    Neo4j special?

    Read more: https://nurkiewicz.com/73

    Get the new episode straight to your mailbox: https://nurkiewicz.com/newsletter

    • 4 min

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
Gimlet
NPR
Jack Rhysider
PJ Vogt

You Might Also Like

Mariusz Gil
Dariusz Rosiak
Jamison Dance and Dave Smith
RMF FM
Jack Rhysider
Tomasz Cholewa