Building Better Systems
Ein Podcast von Galois, Joey Dodds, Shpat Morina
22 Folgen
-
Episode #22: Eric Daimler — Guaranteeing the Integrity of Data Models with Category Theory
Vom: 9.8.2022 -
Episode #21: Nikhil Swamy — Fully In Bed With Dependent Types
Vom: 10.6.2022 -
Episode #20: Ankush Desai — P: The Modeling Language That Could
Vom: 28.4.2022 -
#19: Steve Weis — Security Shouldn't Be the Last Check Box
Vom: 14.4.2022 -
#18: Jordan Kyriakidis — Helping People Write More Useful Requirements
Vom: 9.3.2022 -
#17: Iain Whiteside — The Twists and Turns of Validating Neural Networks for Autonomous Driving (Part 2)
Vom: 9.2.2022 -
#16: Iain Whiteside – Autonomous Driving: Reasoning About the Rules of the Road (Part 1)
Vom: 9.2.2022 -
#15: Dr. Kathleen Fisher – Sparking the New Age of Formal Verification at DARPA
Vom: 10.1.2022 -
#14: Leo de Moura — Combining the Worlds of Automated and Interactive Theorem Proving In Lean
Vom: 3.12.2021 -
#13: Rod Chapman – It's Either Automated or It's Wrong
Vom: 24.9.2021 -
#12: Alex Malozemoff & Marc Rosen – Censorship Circumvention with ROCKY Balboa
Vom: 12.8.2021 -
#11: Alastair Reid – Meeting Developers Where They Are
Vom: 23.7.2021 -
#10: Gregory Malecha – Formal Methods and Systems Programmers Working Together
Vom: 11.6.2021 -
#9: Tycho Andersen – Commit Log Spelunking
Vom: 13.5.2021 -
#8: Eric Davis – Building Better Data Models
Vom: 15.4.2021 -
#7: Aditya Thakur – “If it goes too slow, they'll turn it off”: Analysis Tools That Work
Vom: 1.4.2021 -
#6: Dan Guido – What the hell are the blockchain people doing, and why isn't it a dumpster fire?
Vom: 4.2.2021 -
#5: Talia Ringer – Proof Engineering for the People
Vom: 11.1.2021 -
#4: Alex Malozemoff – New attack on homomorphic encryption libraries: what does it mean?
Vom: 15.12.2020 -
#3: Stephen Magill & Tom DuBuisson – Musing on continuous code analysis
Vom: 3.12.2020
Exploring tools and approaches that make us more effective engineers and make our systems safe and reliable. Join us for discussions on recent developments in topics such as best practices in reliability and security, applied formal methods, encryption, and safe and secure hardware.
