show episodes
 
Behind the Tech invites listeners to geek out with an amazing line-up of tech heroes, inventors and innovators. Microsoft CTO Kevin Scott takes tech enthusiasts behind-the-scenes to meet AI experts, computer scientists, authors, musicians, digital leaders, bioengineers and neuroscientists who have made discoveries, built tools, and literally helped make our modern world possible.
 
The Software Misadventures Podcast is where we sit down with software and devops experts to hear their stories from the trenches about how software breaks in production. The show hosts - Ronak, Austin and Guang - have seen first hand how stressful it is when something breaks in production but they have also found it to be the best opportunity to learn about a system more deeply. On this show, they discuss with fellow engineers the principles and practical tips to build resilient software as ...
 
The Tech Unlocked Podcast aims to demystify and diversify the tech industry by giving you the keys to unlock your tech career. On this show, you'll hear authentic and informative career conversations with incredible guests on how to get a job in tech and build a successful tech career. By sharing diverse and unique career stories, I hope to give you the keys to unlock YOUR own tech career. Visit www.techunlockedpod.com and use #techunlockedpod on twitter to continue the conversation.
 
Real answers to questions about work and life in software development. Are you just starting your first software development job? Or working towards that next step in your career? Just wondering if software engineering is for you, and how to get into the industry? Or managing developers, and wondering how? Send in your question to askanengineeringmanager@gmail.com, and we will tell you what we wish we had known in your place.
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
 
Build is a weekly podcast brought to you by Pivotal Tracker hosted by Poornima Vijayashanker, the founder of Femgineer. In this show, Poornima hosts innovators in tech and together they debunk myths and misconceptions related to building tech products and companies.
 
Gosh - keeping up with web development technologies is hard! We interview the best devs in the industry who share their strategies on how they do it. We get insight into their passion for programming, the methods and tools they can’t live without, and how they keep up with the industry's rapid pace. Every episode ends with a "Quickfire Question Round": answers to 5 rapid-fire questions provide some invaluable tips on how to become a first class dev. Keep pushing the limits, and keep pushing ...
 
Loading …
show series
 
The way we write, compile, and run software has continued to evolve since computer programming began. The cloud, serverless, no-code, and CI/CD are all contemporary ideas introduced to help software engineers spend more time on their application and less time on the chores of running it. Darklang is a new way of building serverless backends. It’s a…
 
Tedious, repetitive tasks are better handled by machines. Unless these tasks truly require human intelligence, repetitive tasks are often good candidates for automation. Implementing process automation can be challenging and technical. Increasingly, engineers are seeking out tools and platforms to facilitate faster, more reliable automation. In thi…
 
Financial technology or fintech has always been a hot topic. This is increasingly true in recent years as disruptive companies enter the market to give better alternatives and solutions to consumers. Current is focused on creating better financial outcomes. In addition to providing banking services, their app has many tools and reminders to help us…
 
In this podcast from the Carnegie Mellon University Software Engineering Institute, Carol Smith, a senior research scientist in human-machine interaction, and Jonathan Spring, a senior vulnerability researcher, discuss the hidden sources of bias in artificial intelligence (AI) systems and how systems developers can raise their awareness of bias, mi…
 
Self-driving cars are being tested in our cities, bespoke movie and product recommendations populate our apps, and we can count on our phones to route us around highway traffic... Why, then, do most AI deployments fail? What is needed to create, deploy, and maintain AI systems we can trust to meet our mission needs, particularly for defense and nat…
 
Kevin talks with Peter Lee about critical response scientific research, deep learning and neural networks – all related to Covid-19 and Microsoft’s growing healthcare and life sciences initiative. Listen in as they also discuss the key role that public trust plays in the work of scientists and researchers. Click here for transcript of this episode.…
 
The dream of machines with artificial general intelligence is entirely plausible in the future, yet well beyond the reach of today’s cutting edge technology. However, a virtual agent need not win in Alan Turing’s Imitation Game to be useful. Modern technology can deliver on some of the promises of narrow intelligence for accomplishing specific task…
 
A developer’s core deliverables are individual commits and the pull requests they aggregate into. While the number of lines of code written alone may not be very informative, in total, the code and metadata about the code found in tracking systems present a rich dataset with great promise for analysis and productivity optimization insights. LinearB…
 
Financial security, building working relationships, having a positive impact on the people around you; which of these examples resonates with the way you find meaning in your work? It could be one of them, or all or them, or you may have completely different sources of meaning. In today’s episode, my guest, Sophie Creutz, and I, share how we person…
 
Interest in autonomous vehicles dates back to the 1920s. It wasn’t until the 1980s that the first truly autonomous vehicle prototypes began to appear. The first DARPA Grand Challenge took place in 2004 offering competitors $1 million dollars to complete a 150-mile course through the Mojave desert. The prize was not claimed. Since then, rapid progre…
 
In this SEI Podcast in the “My Story in Computing” series, Rachel Dzombak discusses her journey integrating biomedical, mechanical, and civil engineering to her current leadership role at the SEI as digital transformation lead in artificial-intelligence (AI) engineering.By Dr. Rachel Dzombak
 
Money laundering is not a new crime. However, the growth of digital communications has greatly expanded the opportunity for money launderers to find innovative new ways to hide their true intent. Some estimates suggest it could be as high as 2-5% of the world’s GDP. Unit21 is a customizable no-code platform for risk and compliance operations. They …
 
Web applications often have some sort of login system, and once a user creates an account, they have access to features anonymous users can’t see. In time, application designers will often add an admin level of access for special users. This is often a slow trickle of technical debt. Proper execution of a programmatic authorization system requires …
 
As developers hone their craft, becoming more productive often means learning utilities and tools at the command line. The right combination of various parsing commands chained together through pipes can enable engineers to quickly and efficiently automate many adhoc data processing tasks. In this episode I speak with Adam Gordon Bell about some of…
 
Back from a hiatus Jonathan and Mark give their first impressions of Apple’s California Streaming event. They unveiled a modern iPad mini, iPhone 13 & 13 Pro, Apple Watch Series 7 and more. Did the series 7 live up to expectations? Is this years iPhone a worthy upgrade? Mark and Jonathan talk about what they’re excited for and what they would proba…
 
Modern companies leverage dozens or even hundreds of software solutions to solve specific needs of the business. Organizations need to collect all these disparate data sources into a data warehouse in order to add value. The raw data typically needs transformation before it can be analyzed. In many cases, companies develop homegrown solutions, thus…
 
Leading up to today’s discussion, we have talked about the psychological safety, and dependability of the Aristotle Project. Today, we tackle structure and clarity. We discuss a statement that lists understanding of job expectations, the process for fulfilling them, and knowing the consequences of one’s performance as important pillars for team eff…
 
Bruno Connelly is a VP of Engineering at LinkedIn. He leads the Site Engineering org responsible for LinkedIn's production infrastructure. He joins the show to talk about his journey in tech - from teaching himself how to code at a young age, building, maintaining and reverse engineering software as a teenager, building ISPs in the early part of hi…
 
An application network is a way to connect applications, data and devices through APIs that expose some or all of their assets and data on the network. That network allows other consumers from other parts of the business to come in and discover and use those assets (mulesoft.com). The company Tetrate provides the tools necessary for a highly effici…
 
The rapid pace of change in software development, in business, and in the world has many organizations struggling to execute daily operations, wrangle big projects, and feel confident that there is a long-term strategy at play. Incorporating agile principles into strategic planning and execution is a highly effective way to drive strategy developme…
 
Misuse of authorized access to an organization’s critical assets is a significant concern for organizations of all sizes, missions, and industries. We at the CERT National Insider Threat Center have been collecting and analyzing data on incidents involving malicious and unintentional insider since 2001, and have worked with numerous organizations a…
 
A software engineer will make many mistakes on their career journey. In time, engineers learn to make smaller mistakes, recognize them faster, and build with appropriate guardrails. The demands of delivering software in a timely and efficient fashion often demands developers carefully optimize tradeoffs to deliver solutions to the problems at hand.…
 
By most accounts, the first databases came on line in the 1960s. This class of software has continued to evolve alongside the technology it runs on and the applications it supports. In the early days, databases were typically closed source commercial products. Today, databases run in the cloud on distributed systems. Increasingly, the leading tools…
 
Instabase is a technology platform for building automation solutions. Users deploy it onto their own infrastructure and can leverage the tools offered by the platform to build complex workflows for handling tasks like income verification and claims processing. In this episode we interview Anant Bhardwaj, founder of Instabase. He describes Instabase…
 
Today we continue our exploration of the Aristotle Project, and we are joined by Sophie Creutz to discuss dependability. Dependability is one of the factors that Google found to be most impactful on the success of a team and to kick things off we run through this list again, as well as some of the surprising things that are not correlated to a team…
 
I assume the questions is supposed to mean "What does an engineering manager actually do?" But to start with, lets answer the question literally: If you've wanted to know what an example of a work week looks like for me, here's your chance to find out. Then we go deeper into what determines the parts of the job of an engineering manager, and what t…
 
From computer chips to construction materials, there is a global supply chain shortage happening right now according to the New York Times. So what is supply chain? what role does it play in the tech ecosystem? and what jobs exist within this career field? In the last episode of season two, Grace chats with Malcolm Hodge a Strategy Sourcing Manager…
 
The Israeli Tech Radar is an opinionated map of the latest technologies and trends in the Israeli tech industry. Now in its fifth edition, the Tech Radar was built in collaboration with Monday, Wix, Riskified, Netapp, Tabula, and other tech companies. Lior Kanfi is the CEO of Tikal. In this episode, we interview Lior about the Tech Radar as well as…
 
This episode is hosted by Kyle Polich of the Data Skeptic podcast. We're glad to welcome Kyle to the Software Daily team. Becoming a contributor to an existing software project can be a daunting task for an engineer. A common convention is to add a README file to your repository to serve as a trailhead which gives new visitors step by step instruct…
 
Whether organizing projects, working from home, or conducting business, you need to use many necessary apps and cloud services to do the job. Despite these apps being necessary, switching between them and keeping them interconnected and updated is a challenge. They very easily become disorganized which makes using them less efficient. The company C…
 
Safety in an office environment might not be something most people think about. Unlike working in a job that requires manual labor, dangers in an office are less visible. That does not make them more serious. In today’s episode, we discuss psychological safety and what this entails. There is a range of definitions for the concept, but it should be …
 
Kubernetes is an open source container orchestration service released by Google in 2014. It has quickly grown into a platform with a huge community of enthusiasts and professionals. Besides becoming the de facto standard for container orchestration, it has fostered an ecosystem of related tools and services with increasing power and sophistication …
 
Are you struggling to meet new people while working from home? Do you hate networking but still want to build your network? Goodnews, this episode is for you! In this episode, Grace shares 5 tips on how to network in a remote and hybrid workforce. Follow Tech Unlocked for career tips: Substack Twitter Instagram Connect with Grace: Twitter LinkedIn …
 
ETL stands for “extract, transform, load” and refers to the process of integrating data from many different sources into one location, usually a data warehouse. This process has become especially important for companies as they use many different services to collect and manage data. The company Grouparoo provides an open source framework that helps…
 
In the late 1970s a printer at MIT kept jamming, resulting in regular pileups of print jobs in the printer’s queue. To solve this problem, some computer scientists wrote a software program that alerted every user in the backed up queue “The printer is jammed, please fix it.” When a man named Richard Stallmen was refused a copy of the program code, …
 
In this SEI Podcast, Dr. Leigh Metcalf and Dr. Jonathan Spring, both researchers with the Carnegie Mellon University Software Engineering Institute’s CERT Division, discuss the application of scientific methods to cybersecurity. As described in their recently published book, Using Science in Cybersecurity, Metcalf and Spring describe a common-sense…
 
Google uses automated programs called spiders, or crawlers, to index and rank web pages. Then, when a user searches for something, it uses a special algorithm to determine the order of results to display (howstuffworks). This process, of course, applies to web pages on the internet. There are 2 major projects, worked on by the company Edge & Node, …
 
Are premortems as morbid as their name suggests or are they difficult but necessary measures to take for identifying possible future threats? This is the topic we explore today and we have our guest extraordinaire Sophie Creutz back on the show to help us tackle it. Our discussion is filled with strong arguments from both sides of the table. On the…
 
Application security is usually done with a set of tools and services known as SIEM - Security Information and Event Management. SIEM tools usually try to provide visibility into an organization’s security systems, as well as event log management and security event notifications. The company Panther takes traditional SIEM security a step further. P…
 
The short answer here is of course "yes". The episode elaborates why, when, and for who unit tests have the greatest value, how to overcome reasons not to write tests, and lists arguments for why unit tests are important. Note: I mis-spoke in the episode - the full term for TDD is, of course, correctly "Test-driven development", not "test-driven de…
 
“In October 1958, Physicist William Higinbotham created what is thought to be the first video game. It was a very simple tennis game, similar to the classic 1970s video game Pong, and it was quite a hit at a Brookhaven National Laboratory open house” (aps.org). 63 years have passed, and video games are prolific. The company Pragma provides a backen…
 
Time series data are simply measurements or events that are tracked, monitored, downsampled, and aggregated over time. This could be server metrics, application performance monitoring, network data, sensor data, events, clicks, trades in a market, and many other types of analytics data (influxdata.com). The platform InfluxData is designed for build…
 
Domain names are the address of your website that people type into the browser URL bar. Once purchased, a domain name is stored on your behalf by custodians like Google domains. Blockchain domains, on the other hand, are similar to regular domain names except they are stored and controlled in your cryptocurrency wallet. The company Unstoppable Doma…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login