Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Applied Mathematics Podcasts

show episodes
 
Artwork

1
Voices of Mathematics

Mathematics Faculty, University of Cambridge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Insights and interviews from the Mathematics Faculty, University of Cambridge. Voices of Mathematics takes you inside the University of Cambridge's Mathematics Faculty, the home of the Cambridge Mathematics departments. From number theory and geometry to cosmology and quantum physics, the Faculty's work explores fundamental and exciting questions to extend the boundaries of discovery. In conversations with researchers from both departments, we explore topics across pure and applied mathemati ...
  continue reading
 
Welcome to Science Sessions, the PNAS podcast program. Listen to brief conversations with cutting-edge researchers, Academy members, and policymakers as they discuss topics relevant to today's scientific community. Learn the behind-the-scenes story of work published in PNAS, plus a broad range of scientific news about discoveries that affect the world around us.
  continue reading
 
Artwork
 
Explore the minds of fascinating specialists ranging from mathematics, physics, web3, cybersecurity, HFT/MEV, startup founders, investigators and so many more. Every episode will give you a glimpse into the unknown unknowns. Enjoy your stay, anon. Keywords: mathematics, math, physics, biology, chemistry, solo auditor, public auditing platforms, private audits, scalability, freedom, Scraping Bits podcast, blockchain technology, audit industry, flashbots, reverse engineering, cybersecurity, in ...
  continue reading
 
Artwork

151
Breaking Math Podcast

Autumn Phaneuf

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Breaking Math is a deep-dive science, technology, engineering, AI, and mathematics podcast that explores the world through the lens of logic, patterns, and critical thinking. Hosted by Autumn Phaneuf, an expert in industrial engineering, operations research and applied mathematics, and Gabriel Hesch, an electrical engineer (host from 2016-2024) with a passion for mathematical clarity, the show is dedicated to uncovering the mathematical structures behind science, engineering, technology, and ...
  continue reading
 
Artwork
 
The scientific rigor, logic, and reasoning of the teachings of Vedanta, applied to some key concepts in science, will lead to the realization that they share common ground—in fact, that they are looking at the same Reality. The ancient Indian rishis had already discovered this Reality and expounded their findings in the various Upanishads and scriptures. We can learn much from Vedanta about science. For example, it helps us interpret Einstein’s Theory of Relativity and quantum physics correc ...
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
  continue reading
 
Welcome to Next Rung Radio Podcast, where each episode is a rung on the ladder to your highest self. Hosted by multi-hyphenate creator and seven-figure entrepreneur Ron Creech, this is more than just a podcast, it’s a raw, real, and radically honest journey into the principles that elevate mind, voice, and vision. From starting with nothing but a dream and $20 in his pocket to building multiple thriving businesses, Ron brings you the mindset and tools that changed his life—and will change yo ...
  continue reading
 
Artwork

201
Cryptography FM

Symbolic Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
  continue reading
 
Nodycast is a lively podcast discussing the theory, techniques and latest innovations in nonlinear dynamics, and its applications to systems of all kinds. This includes almost everything under the sun such as mechanical, structural, electrical, chemical, thermo-fluid, ecological, economic, epidemiological, biological and chemical systems. It is hosted by Dr. 'Nat' C. Nataraj, Moritz Professor at Villanova University and Senior Editor for Nonlinear Dynamics, a Springer-Nature journal.
  continue reading
 
Artwork

1
Department of Statistics

Oxford University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Department of Statistics at Oxford is a world leader in research including computational statistics and statistical methodology, applied probability, bioinformatics and mathematical genetics. In the 2014 Research Excellence Framework (REF), Oxford's Mathematical Sciences submission was ranked overall best in the UK. This is an exciting time for the Department. We have now moved into our new home on St Giles and we are currently settling in. The new building provides improved lecture and ...
  continue reading
 
Mathematical Philosophy - the application of logical and mathematical methods in philosophy - is about to experience a tremendous boom in various areas of philosophy. At the new Munich Center for Mathematical Philosophy, which is funded mostly by the German Alexander von Humboldt Foundation, philosophical research will be carried out mathematically, that is, by means of methods that are very close to those used by the scientists. The purpose of doing philosophy in this way is not to reduce p ...
  continue reading
 
Artwork

4
White Coat White Collar ®

Dr. Aurellia Whitmore

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
If you're searching for an authentic, career-focused podcast, designed by STEM and healthcare professionals for STEM and healthcare professionals, you're in the right place! The White Coat White Collar® Podcast is on a mission to demystify the career landscape so STEM and healthcare students, graduates, and professionals can find the path best suited to them. In each bi-weekly episode, podcast host Dr. Aurellia Whitmore dives deep into the diverse career options in the science, technology, e ...
  continue reading
 
Loading …
show series
 
In this conversation, Dr.Vlatko Vedral discusses the complexities of quantum mechanics and its implications for our understanding of reality. He explores the stagnation in physics, the importance of thought experiments, and the potential for new discoveries through technological advancements. Vlatko emphasizes the need for adventurous research and …
  continue reading
 
Jon Krohn speaks to researcher, broadcaster and author Stephanie Hare about how the Hippocratic Oath might apply to artificial intelligence, and a guiding ethos for pushing innovation while protecting users from harm. A code of conduct, she says, could be one approach to ensuring that people are using technology more mindfully and ethically, as wel…
  continue reading
 
On this episode of Next Rung Radio, we shine a light on the magnetic duo Beck and Call. Becca Bradley and Chris Carnes each walked through the fires of solo artistry, carrying both the scars and the lessons of going it alone. But when they came together, something electric sparked — haunting cello lines intertwined with soulful vocals, pop sensibil…
  continue reading
 
Swamp lights and bat sight Science Sessions are brief conversations with cutting-edge researchers, National Academy members, and policymakers as they discuss topics relevant to today's scientific community. Learn the behind-the-scenes story of work published in the Proceedings of the National Academy of Sciences (PNAS), plus a broad range of scient…
  continue reading
 
In this conversation, Drs. Gaurav Suri and Jay Mcclelland delves into the intricate relationship between artificial intelligence and human cognition, exploring similarities and differences, the evolution of AI from rule-based systems to learning models, and the concept of emergence in both fields. The discussion also touches on the efficiency of hu…
  continue reading
 
In this episode, we aim to provide mathematical proof for the Hubble Constant, shedding light on the correct structure of space. In 1929, astronomer Edwin Hubble observed that distant galaxies appeared to be moving away from Earth, a discovery he made by analyzing their light through telescopes. This observation led to the formulation of what is no…
  continue reading
 
With the number of jobs dramatically slowing in the last year, many question if this decline is down to companies turning to AI for completing entry-level tasks in particular. Research published earlier this month by Yale University shows no major difference in the types of roles and tasks in so-called `white-collar jobs` since late 2022, an auspic…
  continue reading
 
Welcome to Voices of Mathematics, the podcast that takes you inside the Mathematics Faculty at the University of Cambridge. After five and a half years, Professor Colm-cille Caulfield stepped down as Head of the Department of Applied Mathematics and Theoretical Physics (DAMTP) here in Cambridge from 1 October 2025, handing over the role to Professo…
  continue reading
 
On this rung of Next Rung Radio, we welcome Ryan Weaver, U.S. Army Black Hawk pilot turned country music firebrand. After losing his brother (KIA) and later his brother-in-law in combat, Ryan chose purpose over paralysis, turning grief into fuel. From karaoke contests and writing songs in the desert to standing center stage at Madison Square Garden…
  continue reading
 
Sheamus McGovern, CEO of Open Data Science, takes Jon Krohn and his listeners on a journey to launching his popular data science and AI conference, now in its tenth year, as well as the great shifts to the fields that he has seen on the way. For Seamus, the growth of his Open Data Science Conference has shown him that an AI engineer is just the beg…
  continue reading
 
In this conversation, Dr. Caleb Scharf discusses the evolution of space exploration, drawing parallels to historical figures like Darwin. He explores the implications of humanity's expansion into space, the challenges of microgravity, and the allure of Mars as a potential habitat. Scharf emphasizes the interconnectedness of space exploration with o…
  continue reading
 
In this episode, we will explore the Power and Essence of Knowing. Yes, Knowing holds a supreme position—it is truly the master. While it may seem simple to say that Knowing is simply “to know,” there is a much deeper dimension to this concept. For students of Veydaantaa, Knowing is synonymous with Consciousness. It is regarded as one of the most p…
  continue reading
 
Larissa Schneider speaks to Jon Krohn in this Feature Friday about finding the right time to invest in AI solutions, and when it’s better to build them yourself. She discusses her work leading global strategy and operations at Unframe, and how they raised $50 million in venture capital since the company’s launch in March 2025. Additional materials:…
  continue reading
 
This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
  continue reading
 
This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
  continue reading
 
This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
  continue reading
 
AI predictions, and how to act on them: Data Science Strategist at Gurobi, Jerry Yurchisin, speaks to Jon Krohn about how mathematical optimization helps enterprises automate decisions for business success and where to find the resources to make it happen. This episode is brought to you by the ⁠ODSC, the Open Data Science Conference, by Fabi, by ⁠D…
  continue reading
 
On this rung of Next Rung Radio, we spotlight a visionary who stepped into the music industry not as an artist, but as the strategist who could see what was broken and dared to fix it. Mike Castronovo built his career in wealth management and international markets, mastering numbers the way musicians master notes. But when his daughter pursued musi…
  continue reading
 
In this engaging conversation, Rachel Ignotofski discusses her new book Dinosaurs, exploring the fascination with these ancient creatures, the impact of mass extinctions, and the evolution of life on Earth. She highlights the importance of paleontology, the legacy of Mary Anning, and the artistic choices made in illustrating the book. The discussio…
  continue reading
 
Implications of a mutation in modern humans Science Sessions are brief conversations with cutting-edge researchers, National Academy members, and policymakers as they discuss topics relevant to today's scientific community. Learn the behind-the-scenes story of work published in the Proceedings of the National Academy of Sciences (PNAS), plus a broa…
  continue reading
 
This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
  continue reading
 
This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
  continue reading
 
This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
  continue reading
 
This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
  continue reading
 
This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
  continue reading
 
This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
  continue reading
 
This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
  continue reading
 
This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
  continue reading
 
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
  continue reading
 
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
  continue reading
 
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
  continue reading
 
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
  continue reading
 
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
  continue reading
 
This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
  continue reading
 
This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
  continue reading
 
This episode explores the core principles of cryptography, emphasizing that true security is rooted not just in strong math but in meticulous engineering and key management. The efficiency of modern encryption largely relies on symmetric ciphers like AES and 3DES, which use the same secret key for both encryption and decryption. A critical challeng…
  continue reading
 
This episode dives into the Protocol Paradox, which states that the security of systems built on the mathematical bedrock of cryptography is constantly undermined by flaws in the implementation and surrounding processes. Cryptographic algorithms are theoretically strong because they rely on computationally hard math problems, but successful attacks…
  continue reading
 
This episode explores the significant gap between the theoretical security of cryptography, based on complex mathematics like modular arithmetic and computationally hard problems, and the messy reality of real-world digital security. Cryptographic algorithms are tested against theoretical attacks, aiming to make it mathematically impossible to reve…
  continue reading
 
In this episode, we will explore the connection between dark energy and space. Scientific research suggests that dark energy constitutes about 79% of the total energy present in the universe. It is referred to as "dark" because it cannot be directly detected, yet its presence is undeniable. Without dark energy, the universe would not be able to sus…
  continue reading
 
Jon Krohn’s highlights from this month of interviews focus on ways to future-proof your career, looking at the hardware that will get you the most mileage, the emerging roles that are well worth a look, and the developments in AI that will endure in a field constantly testing the durability of its own breakthroughs. Additional materials: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠…
  continue reading
 
In this episode, we will explore the concept that Awareness is the fundamental Reality underlying all existence. It serves as the foundation for everything in the universe. This Reality expresses itself in three distinct forms: 1. Self-Awareness 2. Reflected Awareness 3. Refracted Awareness. These correspond to SatChitAnanda, Ishvara, and Guru, res…
  continue reading
 
Prompt injections, malicious code, and AI agents: In this week’s Five-Minute Friday, Jon Krohn looks into the current security weaknesses found in AI systems. A structural vulnerability that The Economist dubs a “lethal trifecta” could cause havoc for AI users, unless we take the necessary steps to contain our systems. Additional materials: ⁠⁠⁠⁠⁠⁠⁠…
  continue reading
 
On this rung of Next Rung Radio, we welcome a man whose fingerprints are all over some of the biggest names in music. David Browning has spent more than 30 years as a producer, performer, and songwriter, working alongside artists like Katy Perry, Natalie Grant, and C.C. Winans. But his story goes far beyond studio walls and stages. He’s walked hand…
  continue reading
 
Welcome to the very first official episode of Next Rung Radio Podcast, where every rung on the ladder is another step toward purpose, power, and resilience. To kick off this journey, we’re joined by country artist and survivor Cayden Gillard — a man who embodies what it means to rise through adversity. From a leukemia diagnosis at just 14, to picki…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play