30s Ad: $129 - $155
60s Ad: $151 - $178
CPM Category: Business
Different podcast categories command different CPM (cost per mille) rates based on advertiser demand and audience value.
Code Story is A podcast featuring startup founders, tech leaders, CTO's, CEO's, and software architects, reflecting on their human story in creating world changing innovation, disruptive digital products.
Their tech. Their products. Their stories.
Code Story is A podcast featuring startup founders, tech leaders, CTO's, CEO's, and software architects, reflecting on their human story in creating world changing innovation, disruptive digital products.
Their tech. Their products. Their stories.
Producers, Hosts, and Production Team
Searching
Searching for producer information... This may take a moment.
Producers, Hosts, and Production Team
No producer information available yet. Click "Find producers" to search for the production team.
Emails, Phones, and Addresses
Contact Page Emails
Emails listed specifically on the website's official contact page.
Emails
Phone Numbers
No phone numbers found.
Addresses
No addresses found.
Form
A contact form is available on this page.
You can fill out the form at
this link.
Here's a quick summary of the last 5 episodes on Code Story: Insights from Startup Tech Leaders.
Hosts
Not specified
unknown
Previous Guests
David Young
David Young is a tech entrepreneur and the founder of Federated Computer. He has spent many years in California and currently resides in Colorado Springs. David is passionate about balancing work with personal interests, emphasizing the importance of life outside of work. He is married and enjoys outdoor activities such as skiing, hiking, and camping. An accomplished endurance athlete, David has completed 10 marathons, which include a 2.4-mile swim, a 112-mile bike ride, and a marathon, all in one day. His insights into the SaaS industry highlight the challenges of cost and maintenance associated with software solutions, leading to the creation of Federated Computer, which aims to provide better pricing and bundling of software solutions.
David Young is a tech entrepreneur and the founder of Federated Computer. He has spent many years in California and currently resides in Colorado Springs. David is passionate about balancing work with personal interests, emphasizing the importance of life outside of work. He is married and enjoys outdoor activities such as skiing, hiking, and camping. An accomplished endurance athlete, David has completed 10 marathons, which include a 2.4-mile swim, a 112-mile bike ride, and a marathon, all in one day. His insights into the SaaS industry highlight the challenges of cost and maintenance associated with software solutions, leading to the creation of Federated Computer, which aims to provide better pricing and bundling of software solutions.
Eve Rajca
Eve Rajca is a Senior Solutions Engineer at Protegrity, specializing in AI-powered data security solutions. With a strong background in cybersecurity, she focuses on helping organizations reassess and simplify their security strategies to protect against evolving threats. Eve is known for her expertise in identifying outdated security methods and advocating for straightforward approaches to data protection.
Eve Rajca is a Senior Solutions Engineer at Protegrity, specializing in AI-powered data security solutions. With a strong background in cybersecurity, she focuses on helping organizations reassess and simplify their security strategies to protect against evolving threats. Eve is known for her expertise in identifying outdated security methods and advocating for straightforward approaches to data protection.
Kavitta Ghai
Kavitta Ghai is a neurodivergent entrepreneur who co-founded Nectir, a company aimed at transforming the educational experience. Growing up with autism and ADHD, she faced unique learning challenges but was supported by her parents to find creative outlets. Kavitta's frustration with the traditional classroom led her to innovate and create solutions that address the inefficiencies in education. In her personal time, she enjoys disconnecting from technology and exploring new languages.
Kavitta Ghai is a neurodivergent entrepreneur who co-founded Nectir, a company aimed at transforming the educational experience. Growing up with autism and ADHD, she faced unique learning challenges but was supported by her parents to find creative outlets. Kavitta's frustration with the traditional classroom led her to innovate and create solutions that address the inefficiencies in education. In her personal time, she enjoys disconnecting from technology and exploring new languages.
Darko Fabijan
Darko Fabijan is originally from Serbia and splits his time between Serbia and the US. He got his first computer in 1994 and began tinkering with Linux. He attended university in 2003 and started a company with a college friend, which was a Rails consultancy. Darko is married with two children, ages 3 and 9. He enjoys spending time in nature with his family and has taken up trail running, recently completing a 64km trail. He has a keen interest in business books, as he likes to learn from the successes and failures of others. In 2011, he was running his consulting shop with 7 or 8 people and identified a gap in the market for continuous integration solutions, which led to the creation of Semaphore.
Darko Fabijan is originally from Serbia and splits his time between Serbia and the US. He got his first computer in 1994 and began tinkering with Linux. He attended university in 2003 and started a company with a college friend, which was a Rails consultancy. Darko is married with two children, ages 3 and 9. He enjoys spending time in nature with his family and has taken up trail running, recently completing a 64km trail. He has a keen interest in business books, as he likes to learn from the successes and failures of others. In 2011, he was running his consulting shop with 7 or 8 people and identified a gap in the market for continuous integration solutions, which led to the creation of Semaphore.
Clyde Williamson
Clyde Williamson is a Senior Product Security Architect with extensive experience in data security and compliance. He specializes in developing strategies for safeguarding consumer data and ensuring regulatory adherence. Clyde has a strong background in addressing the challenges businesses face in protecting sensitive information while maintaining accessibility for legitimate use. His insights into the evolving landscape of data protection and cybersecurity make him a key figure in discussions about consumer privacy and data governance.
Clyde Williamson is a Senior Product Security Architect with extensive experience in data security and compliance. He specializes in developing strategies for safeguarding consumer data and ensuring regulatory adherence. Clyde has a strong background in addressing the challenges businesses face in protecting sensitive information while maintaining accessibility for legitimate use. His insights into the evolving landscape of data protection and cybersecurity make him a key figure in discussions about consumer privacy and data governance.
Topics Discussed
SaaS
open source software
Federated Computer
endurance athletes
marathons
triathlons
data protection
cybersecurity
KISS Method
threat actors
security strategies
employee training
neurodivergent
autism
ADHD
Nectir
education
classroom
innovation
Darko Fabijan
Semaphore
continuous integration
Rails consultancy
trail running
business books
consumer privacy
regulatory compliance
data accessibility
data de-identification
data breaches
Their tech. Their products. Their stories... Code Story is a podcast featuring tech leaders, reflecting on the roads they travelled and the products they created.
How does a startup get from the back of a napkin – to MVP – to exit? Code Story brings you in-depth interviews with founders, CTOs and tech decision-makers, digging deep into the vision and critical moments of the people putting it all on the line in the name of a great idea. Hosted by tech entrepreneur Noah Labhart, Code Story is a periodic window into the startup world. In their own words, veterans share what it feels like to disrupt an industry, how to recover from critical mistakes, and what it takes to build – and lead – a team that has your back.
David Young spent many years in California, but lives in Colorado Springs now. He mentioned that things outside of work are very important to him, as they are the soil from which he brings fruit to bear in his work. He's married and loving living in the Rockies. He and his wife love to ski hike and camp - but most interesting, they are both endurance athletes. They run marathons, bike rides, and triathlons - in fact, David himself has run 10, which includes a 2.4 mile swim, 112 mile bike ride, then a marathon - all in succession. All in one day.
David noticed that that problem with SaaS today is that it's expensive, and adds up as you compile solutions. Right alongside that, open source software is free - but requires more setup and maintenance to keep it up and running. He decided that there must be a better way to purchase software, while getting the best price on a bundle of solutions.
David Young spent many years in California, but lives in Colorado Springs now. He mentioned that things outside of work are very important to him, as they are the soil from which he brings fruit to bear in his work. He's married and loving living in the Rockies. He and his wife love to ski hike and camp - but most interesting, they are both endurance athletes. They run marathons, bike rides, and triathlons - in fact, David himself has run 10, which includes a 2.4 mile swim, 112 mile bike ride, then a marathon - all in succession. All in one day.
David noticed that that problem with SaaS today is that it's expensive, and adds up as you compile solutions. Right alongside that, open source software is free - but requires more setup and maintenance to keep it up and running. He decided that there must be a better way to purchase software, while getting the best price on a bundle of solutions.
The Gene Simmons of Data Protection – Are Your Systems Smarter Than a Threat Actor?
Hosts
Hosts of this podcast episode
unknown
Guests
Guests of this podcast episode
Eve Rajca
Keywords
Keywords of this podcast episode
data protectioncybersecurityKISS Methodthreat actorssecurity strategiesemployee training
The Gene Simmons of Data Protection: Protegrity's KISS Method
Today, we are releasing another episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.
Episode Title: Are You Smarter Than a Threat Actor? Maybe Your Current Methods Are Obsolete
In today's episode, we are talking with Eve Rajca, Senior Solutions Engineer, as she dives into the ever-evolving landscape of cybersecurity. As threat actors become more sophisticated, its critical to reassess and simplify security strategies. She will explore outdated methods, which can leave your data vulnerable, and discuss the importance of adopting straightforward security methods.
Questions
What are some common signs that an organization's current cybersecurity methods might be outdated?
How have threat actors evolved in their tactics over the past few years?
Can you explain the concept of "security through simplicity" and why it's important?
How can organizations balance the need for robust security with the need for simplicity?
What role does employee training play in maintaining effective data security?
The Gene Simmons of Data Protection: Protegrity's KISS Method
Today, we are releasing another episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.
Episode Title: Are You Smarter Than a Threat Actor? Maybe Your Current Methods Are Obsolete
In today's episode, we are talking with Eve Rajca, Senior Solutions Engineer, as she dives into the ever-evolving landscape of cybersecurity. As threat actors become more sophisticated, its critical to reassess and simplify security strategies. She will explore outdated methods, which can leave your data vulnerable, and discuss the importance of adopting straightforward security methods.
Questions
What are some common signs that an organization's current cybersecurity methods might be outdated?
How have threat actors evolved in their tactics over the past few years?
Can you explain the concept of "security through simplicity" and why it's important?
How can organizations balance the need for robust security with the need for simplicity?
What role does employee training play in maintaining effective data security?
Kavitta Ghai realized at an early age that she thought different than everyone else. She grew up neurodivergent, with autism and ADHD but was a lucky kid, having parents that helped her see the silver lining in her learning challenges, making sure she had outlets in extracurricular activities. She is a creative person always looking to build something that doesn't exist. In her off time, she enjoys turning off all the tech, learning a new language, and reconnecting with the real, analog world.
Kavitta and her co-founder found themselves frustrated with the classroom in college. For paying such an exorbitant amount of money, they were confused why the educational classroom was so ineffective. It came to a head - to the point, where Kavitta was going to change it or drop out of school.
Kavitta Ghai realized at an early age that she thought different than everyone else. She grew up neurodivergent, with autism and ADHD but was a lucky kid, having parents that helped her see the silver lining in her learning challenges, making sure she had outlets in extracurricular activities. She is a creative person always looking to build something that doesn't exist. In her off time, she enjoys turning off all the tech, learning a new language, and reconnecting with the real, analog world.
Kavitta and her co-founder found themselves frustrated with the classroom in college. For paying such an exorbitant amount of money, they were confused why the educational classroom was so ineffective. It came to a head - to the point, where Kavitta was going to change it or drop out of school.
Darko Fabijan is originally from Serbia, and splits his time between their and the US. He got is first computer in 1994, and eventually started tinkering and playing with Linus. He went to university in 2003, and then started a company with a college friend, which was a rails consultancy. Outside of tech, he is married, with 2 kids - ages 3 and 9. The older one is into athletics, and the younger one is more into art. He enjoys spending time in nature with his family, and got into trail running a few years ago - recently running a 64km trail. He enjoys business books because he likes to see how other people "did it", when it comes to their successes and failures.
In 2011, Darko was running his consulting shop with 7 or 8 people. As they were developing applications, they couldn't find anything for continuous integration where you just "signed up" and it worked. That was enough for them to get out there and build it on their own.
Darko Fabijan is originally from Serbia, and splits his time between their and the US. He got is first computer in 1994, and eventually started tinkering and playing with Linus. He went to university in 2003, and then started a company with a college friend, which was a rails consultancy. Outside of tech, he is married, with 2 kids - ages 3 and 9. The older one is into athletics, and the younger one is more into art. He enjoys spending time in nature with his family, and got into trail running a few years ago - recently running a 64km trail. He enjoys business books because he likes to see how other people "did it", when it comes to their successes and failures.
In 2011, Darko was running his consulting shop with 7 or 8 people. As they were developing applications, they couldn't find anything for continuous integration where you just "signed up" and it worked. That was enough for them to get out there and build it on their own.
The Gene Simmons of Data Protection - Fortifying Your Data Defenses
Hosts
Hosts of this podcast episode
unknown
Guests
Guests of this podcast episode
Clyde Williamson
Keywords
Keywords of this podcast episode
data protectionconsumer privacyregulatory compliancedata accessibilitydata de-identificationcybersecuritydata breaches
The Gene Simmons of Data Protection: Protegrity's KISS Method
Today, we are releasing another episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.
Episode Title: Fortifying Your Data Defenses: The Conversation that Should have Happened Yesterday with Clyde Williamson
In this episode, we will be talking with Clyde Williamson, Senior Product Security Architect. Clyde is going to help us see how we've created a broken systems - and it's OK, we are willing to take the necessary steps to fix it. Business face immense pressure to safeguard data, ensure compliance, follow regulation, and make data easily available when needed. This is the conversation we should have heard yesterday, when it comes to our data.
Questions
Why is consumer privacy more critical than ever in today's digital world, and what role do businesses play in protecting and consuming data?
How that concern translates to regulatory requirements and changes for businesses. What does it mean to “future-proof” consumer data in terms of regulatory compliance, and why should businesses care?
How can businesses effectively balance the need for data accessibility with the need to protect consumer privacy?
What role does data de-identification play in helping businesses secure sensitive data while minimizing risk, and what are the tangible benefits?
What are some common pitfalls businesses face when implementing privacy measures, and how can they avoid them?
Can you provide an example of a company that improved consumer trust by adopting stronger data protection strategies?
What are some emerging technologies in data protection and cybersecurity that are making, or will make, a significant impact?
Can you share any real-world examples of data breaches that could have been prevented with better security practices?
The Gene Simmons of Data Protection: Protegrity's KISS Method
Today, we are releasing another episode from our series, entitled The Gene Simmons of Data Protection - the KISS Method, brought to you by none other than Protegrity. Protegrity is AI-powered data security for data consumption, offering fine grain data protection solutions, so you can enable your data security, compliance, sharing and analytics.
Episode Title: Fortifying Your Data Defenses: The Conversation that Should have Happened Yesterday with Clyde Williamson
In this episode, we will be talking with Clyde Williamson, Senior Product Security Architect. Clyde is going to help us see how we've created a broken systems - and it's OK, we are willing to take the necessary steps to fix it. Business face immense pressure to safeguard data, ensure compliance, follow regulation, and make data easily available when needed. This is the conversation we should have heard yesterday, when it comes to our data.
Questions
Why is consumer privacy more critical than ever in today's digital world, and what role do businesses play in protecting and consuming data?
How that concern translates to regulatory requirements and changes for businesses. What does it mean to “future-proof” consumer data in terms of regulatory compliance, and why should businesses care?
How can businesses effectively balance the need for data accessibility with the need to protect consumer privacy?
What role does data de-identification play in helping businesses secure sensitive data while minimizing risk, and what are the tangible benefits?
What are some common pitfalls businesses face when implementing privacy measures, and how can they avoid them?
Can you provide an example of a company that improved consumer trust by adopting stronger data protection strategies?
What are some emerging technologies in data protection and cybersecurity that are making, or will make, a significant impact?
Can you share any real-world examples of data breaches that could have been prevented with better security practices?