Podcast: Play in new window | Download
http://traffic.libsyn.com/sedaily/database_crisis_edited_fixed.mp3Podcast: Play in new window | Download Breakthroughs in modern data research tend to come from companies like Google, Facebook, and Amazon, with projects like MapReduce, Cassandra, and Dynamo. Twenty years ago, this types of breakthroughs would be happening in academia, which causes today’s guest Peter Bailis to ask: is the academic data community having an identity crisis? Peter is an assistant professor at Stanford University, where he
http://traffic.libsyn.com/sedaily/Cimpress_Edited_2.mp3Podcast: Play in new window | DownloadMass customization is the process of making customized, personalized products that are accessible to individuals and small businesses. The process involves manufacturing, assembly lines, supply chains, and software at every step along the way. Today’s guests are Jim Sokoloff and Maarten Wensveen, who work on infrastructure and technology at Cimpress, a mass customization platform. Cimpress has t shirt printers, warehousing machines, supply chain management
http://traffic.libsyn.com/sedaily/Azure-iot_Edited.mp3Podcast: Play in new window | Download The Internet of Things is becoming a reality. Factories are being outfitted with sensors, temperature monitors, and other data gathering devices. In agriculture, farms are becoming more efficient thanks to soil monitoring devices and automated pesticide regulation. In our homes, refrigerators, alarm clocks, and mirrors are becoming “smart”. Steve Busby joins the show today to talk about the big picture: how the Internet
http://traffic.libsyn.com/sedaily/vint_edited.m4aPodcast: Play in new window | DownloadVint Cerf is Chief Internet Evangelist at Google. He contributes to global policy development and continued spread of the Internet. This episode is republished from The Quoracast. Questions: What will the world look like in 5 years? What are the biggest problems associated with rapid spread and development of the Internet? Does blockchain technology present any solutions to these problems Why are cats so
“The three legs of the stool are culture, process, and tooling, and I think process and tooling are the easy ones.”
Modern automated attacks using widespread botnets have evolved in sophistication, making cybercrime an increasingly relevant threat in today’s internet. Security researchers and organizations have to stay vigilant in this cat-and-mouse game.
Shuman Ghosemajumder is the VP of Product at Shape Security, which defends applications from malware and bots. He is the former click fraud czar at Google, and he will be speaking at QCon San Francisco.
This week, Software Engineering Daily sought answers to some fundamental questions from the following guests: David Schwartz talked about maintaining security in Ripple, a distributed cryptographic payment system Craig Smith explained the attack surfaces of cars and the consequences of the Wired Jeep hacking Bruce Schneier surveyed Ashley Madison and other recent events, and talked about Data and Goliath Max Krohn talked about verifying identities with Keybase and protecting OKCupid’s users from bots Adrián Lamo gave a
“What we learn again and again is that security is less about what you think of, and more about what you didn’t think of.”
Bruce Schneier is a security researcher and author of Data and Goliath.
Automobiles are now computers with security vulnerabilities. Reverse engineers have begun to dissect car security.
Craig Smith is the author of The Car Hacker’s Handbook and the founder of Theia Labs, a research and consulting firm.
New types of computers and systems create fresh problems for IT security experts. Security Week is about the vulnerabilities in our accelerating world, and the people and companies that are working to guard against those vulnerabilities. Processor-powered automobiles and cryptocurrencies are new types of networks. They require new types of security models. Academic distributed systems theory is proving necessary but not sufficient. This week is also about the societal consequences of security