Softwareengineering public [search 0]
×
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
Daily podcast about technical software topics. The world through the lens of software.
 
Behind the Tech invites listeners to geek out with an amazing line-up of tech heroes who have made our modern world possible. Join Microsoft’s Chief Technology Officer Kevin Scott, as he takes tech enthusiasts of all ages behind-the-scenes with innovators and pioneers. Find out what inspired them to create tech that has had an impact on the lives of developers and folks around the world. Sign up, tune in, and geek out.
 
S
SEI Cyber Talks
Monthly+
 
Discussions with SEI researchers about cyber-related topics of interest
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
 
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
 
B
Build
Daily+
 
Build is a weekly podcast brought to you by Pivotal Tracker hosted by Poornima Vijayashanker, the founder of Femgineer. In this show, Poornima hosts innovators in tech and together they debunk myths and misconceptions related to building tech products and companies.
 
Bleeding Edge Podcasts cover topics currently driving today's technology landscape. Join co-hosts Christina Rudloff and Troy Mott as they grant you front row access to these topics through interviews with the experts behind them.
 
The podcast to help software engineering students grow personally and professional. Topics covered include study hacks, career advice, successfully getting through university and more. Subscribe to this show through iTunes or your favourite podcast app
 
Gosh - keeping up with web development technologies is hard! We interview the best devs in the industry who share their strategies on how they do it. We get insight into their passion for programming, the methods and tools they can’t live without, and how they keep up with the industry's rapid pace. Every episode ends with a "Quickfire Question Round": answers to 5 rapid-fire questions provide some invaluable tips on how to become a first class dev. Keep pushing the limits, and keep pushing ...
 
Gosh - keeping up with web development technologies is hard! We interview the best devs in the industry who share their strategies on how they do it. We get insight into their passion for programming, the methods and tools they can’t live without, and how they keep up with the industry's rapid pace. Every episode ends with a "Quickfire Question Round": answers to 5 rapid-fire questions provide some invaluable tips on how to become a first class dev. Keep pushing the limits, and keep pushing ...
 
I'm a #technologist; I've been living with and working in #technology for too long. I'm a #Software #Engineer; a #Scrum #Master and anything else that is required.I have had vast experience in and have many stories and views in Technology and I want to share it with you..If you want to learn more about me then check out my homepage at http://seanmccammon.comJust a few hashtags for searching#scrummaster #softwareengineer #udemycoupon #technologyreviews #technologynews #technologychat #html #w ...
 
Loading …
show series
 
In this podcast, the authors discuss a 2019 paper that outlines challenges with the Common Vulnerability Scoring System (CVSS) and proposes changes to improve it.By Jonathan Spring, Art Manion, Deana Shick.
 
Today's major defense systems rely heavily on software-enabled capabilities. However, many defense programs acquiring new systems first determine the physical items to develop, assuming the contractors for those items will provide all needed software for the capability. But software by its nature spans physical items: it provides the inter-syst ...…
 
Neha is cofounder and CTO of Confluent, a company whose mission is to help other companies use Apache Kafka to adopt modern streaming infrastructure. Check out our other shows about technology, visit: The Intrazone: https://aka.ms/TheIntrazone Sync Up, a OneDrive podcast: http://aka.ms/syncupBy Microsoft.
 
The Software Assurance Framework (SAF) is a collection of cybersecurity practices that programs can apply across the acquisition lifecycle and supply chain. The SAF can be used to assess an acquisition program’s current cybersecurity practices and chart a course for improvement, ultimately reducing the cybersecurity risk of deployed, software-r ...…
 
Misuse of authorized access to an organization’s critical assets is a significant concern for organizations of all sizes, missions, and industries. We at the CERT National Insider Threat Center have been collecting and analyzing data on incidents involving malicious and unintentional insider since 2001, and have worked with numerous organizatio ...…
 
In 2017 and 2018, the world witnessed a record number of climate and weather-related disasters. Government agencies are increasingly interested in the use of artificial intelligence (AI) to help first responders in locating survivors, identifying structures in satellite imagery, and removing debris after a disaster. Ritwik Gupta, a machine lear ...…
 
Ritwik Gupta and Elli Kanal explain what ransomware is, what it can do to your computer, and how you can help prevent infections using the concept of cyber hygiene. Ransomware is a type of malware that encrypts the files on a computer, preventing the user from accessing them. The attacker then extorts the user by requesting a ransom in exchange ...…
 
Ritwik Gupta and Elli Kanal explain what ransomware is, what it can do to your computer, and how you can help prevent infections using the concept of cyber hygiene. Ransomware is a type of malware that encrypts the files on a computer, preventing the user from accessing them. The attacker then extorts the user by requesting a ransom in exchange ...…
 
Classifying errors in a component-based system is challenging. Components, and the systems that rely on them, can fail in myriad, unpredictable ways. It is nonetheless a challenge that should be addressed because component-based, software-driven systems are increasingly used for safety-critical applications. In this podcast, SEI researchers Pet ...…
 
Rotem Guttman and Zach Kurtz explain what deepfakes are, how they work, and what kind of content it’s possible to create with current techniques and technology. The term “deepfake” refers to the use of machine learning to produce content for essays or to modify photos and videos. When it comes to photos and videos, the images are often so reali ...…
 
Rotem Guttman and Zach Kurtz explain what deepfakes are, how they work, and what kind of content it’s possible to create with current techniques and technology. The term “deepfake” refers to the use of machine learning to produce content for essays or to modify photos and videos. When it comes to photos and videos, the images are often so reali ...…
 
Sam started his first company at 19 – and has launched many more since then. From Y Combinator to OpenAI, his insights and determination spark inspiration. Hear Sam’s ideas about career motivation, and why he thinks the human brain may be replicable in silicon.By Microsoft.
 
As a principle researcher at the SEI, Suzanne Miller works to help the Department of Defense develop and field software to the warfighter. In this SEI Podcast, the latest highlighting the work of women in software and cybersecurity, Miller discusses the career path that led to her current position and the challenges and mentors that she encount ...…
 
Rotem Guttman and April Galyardt describe how machine learning (ML) fits into the bigger picture of artificial intelligence (AI) and discuss the current state of AI. Currently, there is an enormous amount of interest in machine learning and artificial intelligence and what these new technologies can create for the present and future. In this SE ...…
 
Google login Twitter login Classic login