show episodes
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
 
Behind the Tech invites listeners to geek out with an amazing line-up of tech heroes, inventors and innovators. Microsoft CTO Kevin Scott takes tech enthusiasts behind-the-scenes to meet AI experts, computer scientists, authors, musicians, digital leaders, bioengineers and neuroscientists who have made discoveries, built tools, and literally helped make our modern world possible.
 
B
Build

1
Build

Poornima Vijayashanker

Unsubscribe
Unsubscribe
Monthly
 
Build is a weekly podcast brought to you by Pivotal Tracker hosted by Poornima Vijayashanker, the founder of Femgineer. In this show, Poornima hosts innovators in tech and together they debunk myths and misconceptions related to building tech products and companies.
 
This is Pick Up the PaSE (Podcast Assisted Software Engineering) with your host, the PaSE Master, Steve Essich, I want you to be more successful in the implementation and delivery of high-quality, mission-critical software systems. Drawing upon 40+ years of experience, I provide my pacers with information, opinions, advice, suggestions, and occasionally even wisdom.
 
S
SEI Shorts

1
SEI Shorts

Members of Technical Staff at the Software Engineering Institute

Unsubscribe
Unsubscribe
Monthly
 
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
 
Real answers to questions about work and life in software development. Are you just starting your first software development job? Or working towards that next step in your career? Just wondering if software engineering is for you, and how to get into the industry? Or managing developers, and wondering how? Send in your question to askanengineeringmanager@gmail.com, and we will tell you what we wish we had known in your place.
 
Sync Up will take you behind the scenes of OneDrive. Hosts Ankita Kirti and Jason Moore will shed light on how OneDrive connects you to all your files in Microsoft 365 so you can share and work together from anywhere. Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs. Each episode will also give you news and announcements, tips and best practices for your OneDrive experience. Transcripts provided with each episode.
 
Gosh - keeping up with web development technologies is hard! We interview the best devs in the industry who share their strategies on how they do it. We get insight into their passion for programming, the methods and tools they can’t live without, and how they keep up with the industry's rapid pace. Every episode ends with a "Quickfire Question Round": answers to 5 rapid-fire questions provide some invaluable tips on how to become a first class dev. Keep pushing the limits, and keep pushing ...
 
The Uptake with Anna Chu is a new show on all things tech and community. Host Anna Chu will be traveling and introducing you to people all over the world as she follows the path of Microsoft Ignite The Tour. The show covers topics in the world of tech, as well as uncovers people’s journeys - and how-tos - of professional learning, development and community building. You will meet inspiring people in the community of tech and get inspired to be a part of a vast and expanding community in your ...
 
Loading …
show series
 
Creating a good piece of content is a bit like pair programming, except you get to steer the wheel without ever having to listen to your navigator. With a bunch of hot Udemy courses under his belt and his book Pandas in Action about to hit the shelves, Stride full-stack developer Boris Paskhaver knows a thing or two about creating content, and he j…
 
Monolithic relational databases are the traditional foundation of financial core ledger systems. Nevertheless, the process of building and operating mission critical financial ledgers on these databases, and implementing homegrown accounting models, is a journey fraught with engineering challenges. Twisp has set out to rethink the underlying techno…
 
Java Applications became the go-to preference of most developers because of the write-once-run-anywhere advantage it gave over other languages. And it didn't take much time for Java to become the language for the enterprise. Consequently, most enterprises are still running legacy Java Monoliths on their infrastructure. Breaking up a monolith is not…
 
In this episode, Lina talks to the feedback fairy, a well-known voice in the testing (and not only) community - Maaret Pyhäjärvi about the different readiness for changes in team and supporting the growth journeys. Find Maaret on: - LinkedIn: https://www.linkedin.com/in/maaret/ - Her website: https://maaretp.com - Mastodon: https://mas.to/@maaretp …
 
When Web Assembly was created it was supposed to be a compile target, where you could compile your favorite programming language and then execute it inside of a web browser. This made it possible for developers to choose a programming language like C++ for compute intensive applications. Fermyon is taking Web Assembly to the cloud. With Fermyon Clo…
 
If you are a company with a large pool of physical servers, and compute resources sitting in the data center, and you want to use them efficiently, one way to do that would be to virtualize them. Then you can use those smaller virtual compute resources to run whatever workloads you need. VMware is a company that's known for virtualization. It's als…
 
The shift to a cloud environment provides significant benefits. Cloud resources can be scaled quickly, updated frequently, and widely accessed without geographic limitations. Realizing these benefits, however, requires organizations to manage associated organizational and technical risks. In this podcast from the Carnegie Mellon University Software…
 
With an increasing number of data breaches impacting customer trust, prioritizing data privacy and security is more important than ever. However, as you layer on security and privacy, the overall complexity of a system grows and the data gets harder to use. There’s a constant push and pull between securing and locking down the data but still being …
 
Competitive pressures in many domains, as well as development paradigms such as Agile and DevSecOps, have led to the increasingly common practice of continuous delivery or continuous deployment where frequent updates to software systems are rapidly and reliably fielded. In today’s systems, releases can occur at any time—possibly hundreds of release…
 
The complexity of the software infrastructure has been increasing as companies have migrated towards kubernetes, containers, microservices and other distributed systems. However the tools around observability and monitoring have not seen much improvement. These tools are usually managed by teams distributed across different locations and time zones…
 
Ever wondered whether time away from the screen can lead to any positive outcomes? On today’s episode, we talk about the benefits of vacation, and how they far out way the negatives, while allowing for more productive, alert developers within your team. We touch on all kinds of aspects and kinds of vacation including unlimited vacation, mandatory t…
 
"Companies have to have zero tolerance for racism. Zero tolerance for sexism. Zero tolerance for homophobia." - Amy Weidner Amy is a DE&I Program Manager at Twitter with an extensive experience in recruitment. In this episode, Lina and Amy discuss privilege sharing, culture fit vs. culture add, and how we can improve our workspaces. Find Amy on: - …
 
The Presto/Trino project makes distributed querying easier across a variety of data sources. As the need for machine learning and other high volume data applications has increased, the need for support, tooling, and cloud infrastructure for Presto/Trino has increased with it. Starburst helps your teams run fast queries on any data source. With Star…
 
In today’s world of rapidly-changing technologies and job descriptions, it can be difficult to know which path to pursue. As a result, it often feels simpler to fall into a pattern where we are funneled down the path of least resistance, rather than taking ownership of what we truly want. That’s where career clarity comes in. Today on the show we a…
 
Building and managing data-intensive applications has traditionally been costly and complex, and has placed an operational burden on developers to maintain as their organization scales. Todays’ developers, data scientists, and data engineers need a streamlined, single cloud data platform for building applications, pipelines, and machine learning mo…
 
Infrastructure as code (IaC) is a concept that enables organizations to automate the provisioning and configuration of their IT infrastructure. This concept also aids organizations in applying the DevOps process (plan, code, build, test, release, deploy, operate, monitor, repeat) to their infrastructure. Ansible is a popular choice within the IaC t…
 
Companies are rapidly moving to the cloud, and modern businesses are operating faster with a myriad of SaaS tools in their day-to-day operations. Provisioning resources has been easier than ever. WIth a few clicks you can spin up resources in any part of the world. While we all love the cloud because of the scalability it offers, assets can quickly…
 
Mikko Hypponen is the CRO of WithSecure and a principal research Officer at F-Secure. In this interview with our host, Jordi Monn, he discusses the eventful and rocky early start of his software engineering career, hybrid warfare, reverse engineering, recent exploits like Log for Shell and heart bleed and more. This episode is packed with valuable …
 
Whether you call it a Stand-Up, a Daily Scrum, a Huddle, or a Roll Call this daily check-in is a powerful tool you and your team can use to maximize productivity. During today’s episode, you will learn how to do a Stand-Up, what a Stand-Up consists of, and some pitfalls that you may be deterred by along the way. Most importantly, you need to keep a…
 
Ever joined a new company? I bet. The start is always challenging, and as Angela Riggs says "you have to learn to learn". In this episode of Quality Bits, Lina and Angela discuss the feelings you may face in a new workplace, the job of a QA manager, setting boundaries, and management practices which support the high-quality product building teams. …
 
The lack of qualified cybersecurity professionals in the United States is a threat to our national security. We cannot adequately protect the systems that our government, economy, and critical infrastructure sectors rely on without an appropriately sized cyber workforce. By some estimates, there are over 700,000 cybersecurity job openings across th…
 
Often, developers will be asked to work on a story, but nobody knows quite how to deal with it. That why, today, we are discussing spiking feature work. We are joined by Rob O’Brien, one of the partners here at Stride, and a self-confessed “strongly opinionated product manager.” Rob was formerly one of the principal product managers involved in bui…
 
React is the most widely used front-end framework. It pioneered the component model and influenced the software design of all modern web applications. React is not an opinionated tool, allowing engineers to shape their applications in a way that fits the problems at hand. However, this freedom of expression can be very confusing to newcomers. Alex …
 
Observability is a critical aspect of modern digital applications. You can't operate an application at scale that satisfies your customer needs without understanding how the application is currently performing, whether it's understanding the current operating needs of the application, adjusting resource usage, detecting issues before they become se…
 
Companies receive a large number of applications during the recruitment process which places extra pressure on candidates to stand out amongst the masses. How do you present your resume professionally while ensuring you catch the attention of recruiters? In today’s conversation, we talk to two people who work in the world of talent acquisition to g…
 
The classical computing power has doubled every two years - a pattern known as Moore’s law. However, the ability to fabricate more and more transistors in a computer chip is approaching saturation as we are approaching atomic dimensions. Quantum Computing is a promising technology to take us beyond this. A quantum Computer uses qubits to run multi-…
 
In this episode of Quality Bits, Lina talks to a QA-turned-Director-of-Engineering Finn Lorbeer about his past days of ripping off the QA column as a QA, the differences in driving change when you're a team member versus in a leadership position, and why having fun in the team matters. Find Finn on: - Twitter: https://twitter.com/finnlorbeer - Link…
 
The Java Virtual Machine is an abstract machine that makes it possible for you to write Java code once and run it across multiple devices and operating system types. While you can use the OpenJDK it comes with various issues like Security Vulnerabilities and compliance. Azul is a company that specializes in Java for the enterprise. It has the large…
 
Passwordless Authentication is a technique in which users are given access to an environment without entering a password or answering a security question. This allows users to access an environment securely and protects organizations against attack vectors like Keylogging, Brute force methods, and phishing. The company SuperTokens provides secure l…
 
In this podcast from the Carnegie Mellon University Software Engineering Institute, Thomas Podnar and Dustin Updyke, both senior cybersecurity engineers with the SEI’s CERT Division, discuss their work to apply machine learning to increase the realism of non-player characters (NPCs) in cyber training exercises.…
 
Ransomware poses an imminent threat to most organizations. Whereas most traditional cyber attacks require extended threat actor engagement to seeking out critical information, exporting data, and demanding ransom from victims, ransomware shortens the process and puts immediate pressure on the victim to respond with payment. Unfortunately, the rise …
 
In this episode of The Rabbit Hole, we're talking about The Rules of Simplicity and why you should be following them when building software. We break down the four Rules of Simplicity first laid out in the book Extreme Programming Explained: Embrace Change by Kent Beck and discuss how they relate to other rules and principles that we’ve discussed o…
 
Monolithic relational databases are the traditional foundation of financial core ledger systems. Nevertheless, the process of building and operating mission-critical ledgers to track and reconcile payments and money movement is complex. Twisp is rethinking core accounting and financial orchestration on a cloud-native ledger system, so developers ca…
 
In this podcast from the Carnegie Mellon University Software Engineering Institute, Douglass Post and Richard Kendall, authors of "Creating and Using Virtual Prototyping Software: Principles and Practices" discuss with principal researcher Suzanne Miller experiences and insights that they gleaned from applying virtual prototyping in CREATE (Computa…
 
By all recent measures, the cybersecurity workforce is woefully understaffed. According to (ISC)², the cyber workforce gap in the United States was 377,000 open positions in 2021. The Software Engineering Institute (SEI) at Carnegie Mellon University (CMU) has been working with the U.S. government to development novel approaches designed to shrink …
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login