Software Daily: The world through the lens of software.
…
continue reading
Softwareengineering Podcasts

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
Welcome to Strugglecast, the podcast where we navigate the struggles of UI/UX and software development and how to overcome them.
…
continue reading
High-quality products and teams: what are those? In this podcast, Lina Zubyte takes you on a journey to understand better how to create more efficient and successful tech products with excellent quality.
…
continue reading
A show about not just the technologies, but the people and stories behind them. In every episode, Ronak and Guang sit down with engineers, founders, and investors to chat about their paths, lessons they’ve learned and of course, the misadventures along the way.
…
continue reading
Discussions with SEI researchers about cyber-related topics of interest
…
continue reading
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
…
continue reading
Real answers to questions about work and life in software development. Are you just starting your first software development job? Or working towards that next step in your career? Just wondering if software engineering is for you, and how to get into the industry? Or managing developers, and wondering how? Send in your question to [email protected], and we will tell you what we wish we had known in your place.
…
continue reading
Behind the Tech invites listeners to geek out with an amazing line-up of tech heroes, inventors and innovators. Microsoft CTO Kevin Scott takes tech enthusiasts behind-the-scenes to meet AI experts, computer scientists, authors, musicians, digital leaders, bioengineers and neuroscientists who have made discoveries, built tools, and literally helped make our modern world possible.
…
continue reading

1
Fixate on Code | Weekly interviews on how to write better code, for frontend developers
Larry Botha
Gosh - keeping up with web development technologies is hard! We interview the best devs in the industry who share their strategies on how they do it. We get insight into their passion for programming, the methods and tools they can’t live without, and how they keep up with the industry's rapid pace. Every episode ends with a "Quickfire Question Round": answers to 5 rapid-fire questions provide some invaluable tips on how to become a first class dev. Keep pushing the limits, and keep pushing ...
…
continue reading

1
Emulating Retro Games on Modern Consoles with Robin Lavallée and Bill Litshauer
1:01:34
1:01:34
Play later
Play later
Lists
Like
Liked
1:01:34Emulating retro games on modern consoles is a growing trend, and allows players to experience classic titles with improved performance, enhanced resolution, and added features like save states and rewinding. However, this process raises many challenging technical questions related to hardware compatibility, performance optimization, rendering, and …
…
continue reading

1
The Magic in the Middle: Evolving Scaled Software Solutions for National Defense
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25A January 2025 Defense Innovation Board study on scaling nontraditional defense innovation stated, “We must act swiftly to ensure the DoD leads in global innovation and competition over AI and autonomous systems – and is a trendsetter for their responsible use in modern warfare." In this podcast from the Carnegie Mellon University Software Engineer…
…
continue reading

1
An Introduction to the MLOps Tool Evaluation Rubric
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23Organizations looking to build and adopt artificial intelligence (AI)–enabled systems face the challenge of identifying the right capabilities and tools to support Machine Learning Operations (MLOps) pipelines. Navigating the wide range of available tools can be especially difficult for organizations new to AI or those that have not yet deployed sy…
…
continue reading

1
SED News: Corporate Spies, Postgres, and the Weird Life of Devs Right Now
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38Welcome back to SED News, a podcast series from Software Engineering Daily where hosts Gregor Vand and Sean Falconer break down the latest stories in software engineering, Silicon Valley, and wider tech world. In this episode, Gregor and Sean unpack what’s going with Deel and Rippling, explore why Databricks and Snowflake are making big bets on Pos…
…
continue reading

1
TanStack and the Future of Frontend with Tanner Linsley
55:13
55:13
Play later
Play later
Lists
Like
Liked
55:13TanStack is an open-source collection of high-performance libraries for JavaScript and TypeScript applications, primarily focused on state management, data fetching, and table utilities. It includes popular libraries like TanStack Query, TanStack Table, and TanStack Router. These libraries emphasize declarative APIs, optimized performance, and deve…
…
continue reading

1
The Challenge of AI Model Evaluations with Ankur Goyal
45:22
45:22
Play later
Play later
Lists
Like
Liked
45:22Evaluations are critical for assessing the quality, performance, and effectiveness of software during development. Common evaluation methods include code reviews and automated testing, and can help identify bugs, ensure compliance with requirements, and measure software reliability. However, evaluating LLMs presents unique challenges due to their c…
…
continue reading

1
Modern Distributed Applications with Stephan Ewen
41:20
41:20
Play later
Play later
Lists
Like
Liked
41:20A major challenge with creating distributed applications is achieving resilience, reliability, and fault tolerance. It can take considerable engineering time to address non-functional concerns like retries, state synchronization, and distributed coordination. Event-driven models aim to simplify these issues, but often introduce new difficulties in …
…
continue reading

1
Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Warfighters in the Department of Defense (DoD) operate in high-stakes environments where security, efficiency, and speed are critical. In such environments DevSecOps has become crucial in the drive toward modernization and overall mission success. A recent study led by researchers at the Carnegie Mellon University Software Engineering Institute (SE…
…
continue reading
Agentic AI is seen as a key frontier in artificial intelligence, enabling systems to autonomously act, adapt in real-time, and solve complex, multi-step problems based on objectives and context. Unlike traditional rule-based or generative AI, which are limited to predefined or reactive tasks, agentic AI processes vast information, models uncertaint…
…
continue reading

1
Chip Design in the AI Era with Thomas Andersen
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33Synopsys is a leading electronic design automation company specializing in silicon design and verification, as well as software integrity and security. Their tools are foundational to the creation of modern chips and embedded software, powering everything from smartphones to cars. Chip design is a deeply complex process, often taking months or year…
…
continue reading
Deploying cloud-centric technologies such as Kubernetes in edge environments poses challenges, especially for mission-critical defense systems. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Patrick Earl, Doug Reynolds, and Jeffrey Hamed, all DevOps engineers in the SEI's Software Solutions Division, sit d…
…
continue reading

1
OpenTofu with Cory O’Daniel and Malcolm Matalka
48:58
48:58
Play later
Play later
Lists
Like
Liked
48:58OpenTofu is an open-source alternative to Terraform, designed for managing infrastructure as code. It enables users to define, provision, and manage their cloud and on-premises resources using a declarative configuration language. OpenTofu was created to ensure an open and community-driven approach to infrastructure tooling, and it emphasizes compa…
…
continue reading

1
Mojo and Building a CUDA Replacement with Chris Lattner
56:14
56:14
Play later
Play later
Lists
Like
Liked
56:14Python is the dominant language for AI and data science applications, but it lacks the performance and low-level control needed to fully leverage GPU hardware. As a result, developers often rely on NVIDIA’s CUDA framework, which adds complexity and fragments the development stack. Mojo is a new programming language designed to combine the simplicit…
…
continue reading

1
The State of DevSecOps in the DoD: Where We Are, and What’s Next
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42DevSecOps practices foster collaboration among software development, security, and operations teams to build, test, and release software quickly and reliably. A high-stakes, high-security environment has challenged the implementation of these practices within the Department of Defense (DoD). The DoD Chief Information Officer (CIO) organization part…
…
continue reading

1
Building PostgreSQL for the Future with Heikki Linnakangas
42:12
42:12
Play later
Play later
Lists
Like
Liked
42:12PostgreSQL is an open-source database known for its robustness, extensibility, and compliance with SQL standards. Its ability to handle complex queries and maintain high data integrity has made it a top choice for both start-ups and large enterprises. Heikki Linnakangas is a leading developer for the PostgreSQL project, and he's a co-founder at Neo…
…
continue reading

1
I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds
57:16
57:16
Play later
Play later
Lists
Like
Liked
57:16Did you know there are 500 million tweets per day? 3 billion monthly active Facebook users? 1 billion LinkedIn members? Are you one of them? In this webcast, Destiney Marie Plaza reveals how a hacker can use seemingly benign public information to customize an attack on a victim by showing a scenario-based attack and demo (using free and open-source…
…
continue reading
Cryptocurrency exchanges face unique security challenges that require specialized threat assessments and planning. Coinbase is a cryptocurrency exchange based in the United States. It was founded in 2012 and has evolved alongside cryptocurrency as a technology. Philip Martin is the Chief Security Officer at Coinbase. Prior to Coinbase, Philip built…
…
continue reading

1
Anthropic and the Model Context Protocol with David Soria Parra
51:30
51:30
Play later
Play later
Lists
Like
Liked
51:30The Model Context Protocol, or MCP, is a new open standard that connects AI assistants to arbitrary data sources and tools, such as codebases, APIs, and content repositories. Instead of building bespoke integrations for each system, developers can use MCP to establish secure, scalable connections between AI models and the data they need. By standar…
…
continue reading

1
The Best and Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40A strong cyber defense is vital to public- and private-sector activities in the United States. In 2019, in response to an executive order to strengthen America’s cybersecurity workforce, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) partnered with the SEI to develop and run the President’s Cup Cyberse…
…
continue reading

1
A New Performance Zone for Software for National Security
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23Today, we have seen our national security organizations working to adopt modern software practices, particularly Agile methods and DevSecOps practices, efforts challenged by a mismatch of tempos between operational needs and development processes. The newly mandated Software Acquisition Pathway helps to align those tempos. However, to sustain a com…
…
continue reading

1
Grand Theft Auto III on the Dreamcast with Falco Girgis and Stef Kornilios Mitsis Poiitidis
47:39
47:39
Play later
Play later
Lists
Like
Liked
47:39Grand Theft Auto III is a 2001 an open-world action-adventure game developed by Rockstar Games and it had a profound impact on both gaming and popular culture. Its success cemented video games as a dominant form of entertainment and storytelling, and paved the way for future blockbuster franchises. The game was also a technological milestone that r…
…
continue reading
Polypane is a specialized web development browser that simplifies creating and testing modern websites. A key feature is that it provides multiple screen sizes at once, with synchronized scrolling and interactions, so developers can test different layouts and breakpoints simultaneously. Polypane also focuses on accessibility tools, real-time previe…
…
continue reading
LiveKit is a platform that provides developers with tools to build real-time audio and video applications at scale. It offers an open-source WebRTC stack for creation of live, interactive experiences like video conferencing, streaming, and virtual events. LiveKit has gained significant attention for its partnership with OpenAI for the Advanced Voic…
…
continue reading

1
SED News: CoreWeave IPO, Anthropic’s MCP, and Microsoft Turns 50
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42Welcome to the pilot episode of SED News, a new podcast series from Software Engineering Daily. Join hosts Gregor Van and Sean Falconer as they break down the week's most important stories in software engineering, machine learning, and developer culture. In this episode, Gregor and Sean discuss the CoreWeave IPO and the company's recent acquisition…
…
continue reading
An organization’s cyber risk management practices must be rooted in organizational goals to be truly effective. In this webcast, Matt Butkovic, Greg Crabbe and Beth-Anne Bygum explore how best to align business and resilience objectives.By Matt Butkovic, Greg Crabbe and Beth-Anne Bygum
…
continue reading
AI tools are transforming how developers write code, and although it’s difficult to pinpoint how much code is now AI-generated code, estimates suggest it’s between 20% and 40%, and this figure is poised to grow in the coming years. This evolution has given rise to a new coding paradigm in which developers act as directors, guiding and refining AI-g…
…
continue reading
Glean is a workplace search and knowledge discovery company that helps organizations find and access information across various internal tools and data sources. Their platform uses AI to provide personalized search results to assist members of an organization in retrieving relevant documents, emails, and conversations. The rise of LLM-based agentic…
…
continue reading

1
Updating Risk Assessment in the CERT Secure Coding Standard
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04Evaluating source code to ensure secure coding qualities costs time and effort and often involves static analysis. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making some exciting updates to the SEI CERT C …
…
continue reading

1
Turing Award Special: A Conversation with Martin Hellman
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02Martin Hellman is an American cryptographer known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle in the 1970s. Their groundbreaking Diffie-Hellman key exchange method allowed secure communication over insecure channels, laying the foundation for modern encryption protocols. Hellman has also contributed to cybersecur…
…
continue reading

1
Delivering Next Generation Cyber Capabilities to the DoD Warfighter
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division, sits down with Matthew Butkovic, technical director of Cyber Risk and Resilience at CERT, to discuss ways in which CERT researchers and technologists are working to deliver rapid capability to warfighters in …
…
continue reading

1
Prometheus and Open-Source Observability with Eric Schabell
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06Modern cloud-native systems are highly dynamic and distributed, which makes it difficult to monitor cloud infrastructure using traditional tools designed for static environments. This has motivated the development and widespread adoption of dedicated observability platforms. Prometheus is an open-source observability tool designed for cloud-native …
…
continue reading

1
Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02The Defense Industrial Base (DIB) is a core element of the national security ecosystem. This point of intersection between private industry and the Department of Defense is a perpetual target for the Nation’s adversaries. In this Intersect, Matthew Butkovic and John Haller explore the development, and implementation, of the Cyber Maturity Model Cer…
…
continue reading

1
Turing Award Special: A Conversation with David Patterson
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25David A. Patterson is a pioneering computer scientist known for his contributions to computer architecture, particularly as a co-developer of Reduced Instruction Set Computing, or RISC, which revolutionized processor design. He has co-authored multiple books, including the highly influential Computer Architecture: A Quantitative Approach. David is …
…
continue reading

1
Uber’s On-Call Copilot with Paarth Chothani and Eduards Sidorovics
45:23
45:23
Play later
Play later
Lists
Like
Liked
45:23At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
…
continue reading

1
Turing Award Special: A Conversation with John Hennessy
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03John Hennessy is a computer scientist, entrepreneur, and academic known for his significant contributions to computer architecture. He co-developed the RISC architecture, which revolutionized modern computing by enabling faster and more efficient processors. Hennessy served as the president of Stanford University from 2000 to 2016 and later co-foun…
…
continue reading

1
Sourcegraph and the Frontier of AI in Software Engineering with Beyang Liu
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40By softwareengineeringdaily.com
…
continue reading

1
Threat Hunting: What Should Keep All of Us Up at Night
57:09
57:09
Play later
Play later
Lists
Like
Liked
57:09When it comes to recognizing threats, cybersecurity professionals may become distracted by big promises or ignore some obvious inspections. New claims made by the latest and greatest new apps draw attention away from network situational awareness best practices—like a dog distracted when it spots a squirrel. We also may deviate from making routine …
…
continue reading

1
Turing Award Special: A Conversation with Jeffrey Ullman
38:13
38:13
Play later
Play later
Lists
Like
Liked
38:13Jeffrey Ullman is a renowned computer scientist and professor emeritus at Stanford University, celebrated for his groundbreaking contributions to database systems, compilers, and algorithms. He co-authored influential texts like Principles of Database Systems and Compilers: Principles, Techniques, and Tools (often called the “Dragon Book”), which h…
…
continue reading

1
Getting the Most Out of Your Insider Risk Data with IIDES
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from the Carnegie Mellon University Software Engineering Institute, Austin Whisnant and Dan Costa discuss the Insider Incident Data Expression Standard (IIDES), a new schema for collecting and sharing data about insid…
…
continue reading

1
Knowledge Graphs as Agentic Memory with Daniel Chalef
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Contextual memory in AI is a major challenge because current models struggle to retain and recall relevant information over time. While humans can build long-term semantic relationships, AI systems often rely on fixed context windows, leading to loss of important past interactions. Zep is a startup that’s developing a memory layer for AI agents usi…
…
continue reading
Remix is a full-stack, open-source web framework that was developed by the creators of the popular React Router library. It focuses on features such as server-side rendering and efficient data loading, and it emphasizes developer experience. Ryan Florence is a co-creator of React Remix and in this episode he speaks with Josh Goldberg about the Remi…
…
continue reading

1
Turing Award Special: A Conversation with Jack Dongarra
50:01
50:01
Play later
Play later
Lists
Like
Liked
50:01Jack Dongarra is an American computer scientist who is celebrated for his pioneering contributions to numerical algorithms and high-performance computing. He developed essential software libraries like LINPACK and LAPACK, which are widely used for solving linear algebra problems on advanced computing systems. Dongarra is also a co-creator of the TO…
…
continue reading

1
Can a Cybersecurity Parametric Cost Model be Developed?
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurit…
…
continue reading