Insights and interviews from the Mathematics Faculty, University of Cambridge. Voices of Mathematics takes you inside the University of Cambridge's Mathematics Faculty, the home of the Cambridge Mathematics departments. From number theory and geometry to cosmology and quantum physics, the Faculty's work explores fundamental and exciting questions to extend the boundaries of discovery. In conversations with researchers from both departments, we explore topics across pure and applied mathemati ...
…
continue reading
Applied Mathematics Podcasts
Welcome to Science Sessions, the PNAS podcast program. Listen to brief conversations with cutting-edge researchers, Academy members, and policymakers as they discuss topics relevant to today's scientific community. Learn the behind-the-scenes story of work published in PNAS, plus a broad range of scientific news about discoveries that affect the world around us.
…
continue reading
Explore the minds of fascinating specialists ranging from mathematics, physics, web3, cybersecurity, HFT/MEV, startup founders, investigators and so many more. Every episode will give you a glimpse into the unknown unknowns. Enjoy your stay, anon. Keywords: mathematics, math, physics, biology, chemistry, solo auditor, public auditing platforms, private audits, scalability, freedom, Scraping Bits podcast, blockchain technology, audit industry, flashbots, reverse engineering, cybersecurity, in ...
…
continue reading
Breaking Math is a deep-dive science, technology, engineering, AI, and mathematics podcast that explores the world through the lens of logic, patterns, and critical thinking. Hosted by Autumn Phaneuf, an expert in industrial engineering, operations research and applied mathematics, and Gabriel Hesch, an electrical engineer (host from 2016-2024) with a passion for mathematical clarity, the show is dedicated to uncovering the mathematical structures behind science, engineering, technology, and ...
…
continue reading
The scientific rigor, logic, and reasoning of the teachings of Vedanta, applied to some key concepts in science, will lead to the realization that they share common ground—in fact, that they are looking at the same Reality. The ancient Indian rishis had already discovered this Reality and expounded their findings in the various Upanishads and scriptures. We can learn much from Vedanta about science. For example, it helps us interpret Einstein’s Theory of Relativity and quantum physics correc ...
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Talking to people who use maths in their work. Aiming to encourage further uptake of maths at A-level and beyond. Hosted by Peter Rowlett and Katie Steckles.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
Welcome to Next Rung Radio Podcast, where each episode is a rung on the ladder to your highest self. Hosted by multi-hyphenate creator and seven-figure entrepreneur Ron Creech, this is more than just a podcast, it’s a raw, real, and radically honest journey into the principles that elevate mind, voice, and vision. From starting with nothing but a dream and $20 in his pocket to building multiple thriving businesses, Ron brings you the mindset and tools that changed his life—and will change yo ...
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
Nodycast is a lively podcast discussing the theory, techniques and latest innovations in nonlinear dynamics, and its applications to systems of all kinds. This includes almost everything under the sun such as mechanical, structural, electrical, chemical, thermo-fluid, ecological, economic, epidemiological, biological and chemical systems. It is hosted by Dr. 'Nat' C. Nataraj, Moritz Professor at Villanova University and Senior Editor for Nonlinear Dynamics, a Springer-Nature journal.
…
continue reading
The Journal of Proteome Research integrates the fields of chemistry, mathematics, applied physics, biology, and medicine in order to better understand the function of proteins in biological systems.
…
continue reading
The Department of Statistics at Oxford is a world leader in research including computational statistics and statistical methodology, applied probability, bioinformatics and mathematical genetics. In the 2014 Research Excellence Framework (REF), Oxford's Mathematical Sciences submission was ranked overall best in the UK. This is an exciting time for the Department. We have now moved into our new home on St Giles and we are currently settling in. The new building provides improved lecture and ...
…
continue reading
Mathematical Philosophy - the application of logical and mathematical methods in philosophy - is about to experience a tremendous boom in various areas of philosophy. At the new Munich Center for Mathematical Philosophy, which is funded mostly by the German Alexander von Humboldt Foundation, philosophical research will be carried out mathematically, that is, by means of methods that are very close to those used by the scientists. The purpose of doing philosophy in this way is not to reduce p ...
…
continue reading
If you're searching for an authentic, career-focused podcast, designed by STEM and healthcare professionals for STEM and healthcare professionals, you're in the right place! The White Coat White Collar® Podcast is on a mission to demystify the career landscape so STEM and healthcare students, graduates, and professionals can find the path best suited to them. In each bi-weekly episode, podcast host Dr. Aurellia Whitmore dives deep into the diverse career options in the science, technology, e ...
…
continue reading
A podcast about virtual reality, hosted by Ctrl V co-hosts Josh Brooks & Ben Parent.
…
continue reading
The UL Research Impact Podcast Channel features interviews and seminars exploring research that makes an impact beyond academia.
…
continue reading
Podcast by Psychology In Action Podcast
…
continue reading
1
The Future of Physics: Portals to a New Reality
48:44
48:44
Play later
Play later
Lists
Like
Liked
48:44In this conversation, Dr.Vlatko Vedral discusses the complexities of quantum mechanics and its implications for our understanding of reality. He explores the stagnation in physics, the importance of thought experiments, and the potential for new discoveries through technological advancements. Vlatko emphasizes the need for adventurous research and …
…
continue reading
1
935: Global Issues Accelerated by AI (with Solutions), feat. Stephanie Hare
1:17:27
1:17:27
Play later
Play later
Lists
Like
Liked
1:17:27Jon Krohn speaks to researcher, broadcaster and author Stephanie Hare about how the Hippocratic Oath might apply to artificial intelligence, and a guiding ethos for pushing innovation while protecting users from harm. A code of conduct, she says, could be one approach to ensuring that people are using technology more mindfully and ethically, as wel…
…
continue reading
1
"Two Voices, One Truth" - Featuring Monster Music Duo Beck & Call
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02On this episode of Next Rung Radio, we shine a light on the magnetic duo Beck and Call. Becca Bradley and Chris Carnes each walked through the fires of solo artistry, carrying both the scars and the lessons of going it alone. But when they came together, something electric sparked — haunting cello lines intertwined with soulful vocals, pop sensibil…
…
continue reading
Swamp lights and bat sight Science Sessions are brief conversations with cutting-edge researchers, National Academy members, and policymakers as they discuss topics relevant to today's scientific community. Learn the behind-the-scenes story of work published in the Proceedings of the National Academy of Sciences (PNAS), plus a broad range of scient…
…
continue reading
1
AI vs Human Intelligence: The Emergent Mind
50:25
50:25
Play later
Play later
Lists
Like
Liked
50:25In this conversation, Drs. Gaurav Suri and Jay Mcclelland delves into the intricate relationship between artificial intelligence and human cognition, exploring similarities and differences, the evolution of AI from rule-based systems to learning models, and the concept of emergence in both fields. The discussion also touches on the efficiency of hu…
…
continue reading
In this episode, we aim to provide mathematical proof for the Hubble Constant, shedding light on the correct structure of space. In 1929, astronomer Edwin Hubble observed that distant galaxies appeared to be moving away from Earth, a discovery he made by analyzing their light through telescopes. This observation led to the formulation of what is no…
…
continue reading
With the number of jobs dramatically slowing in the last year, many question if this decline is down to companies turning to AI for completing entry-level tasks in particular. Research published earlier this month by Yale University shows no major difference in the types of roles and tasks in so-called `white-collar jobs` since late 2022, an auspic…
…
continue reading
1
Colm-cille Caulfield: Reflections from DAMTP
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51Welcome to Voices of Mathematics, the podcast that takes you inside the Mathematics Faculty at the University of Cambridge. After five and a half years, Professor Colm-cille Caulfield stepped down as Head of the Department of Applied Mathematics and Theoretical Physics (DAMTP) here in Cambridge from 1 October 2025, handing over the role to Professo…
…
continue reading
1
"Strength After Sacrifice" - Featuring Blackhawk Pilot | Voice of the PBR Ryan Weaver
50:23
50:23
Play later
Play later
Lists
Like
Liked
50:23On this rung of Next Rung Radio, we welcome Ryan Weaver, U.S. Army Black Hawk pilot turned country music firebrand. After losing his brother (KIA) and later his brother-in-law in combat, Ryan chose purpose over paralysis, turning grief into fuel. From karaoke contests and writing songs in the desert to standing center stage at Madison Square Garden…
…
continue reading
1
933: Future-Proofing Your Career in the AI Era, feat. Sheamus McGovern
1:15:10
1:15:10
Play later
Play later
Lists
Like
Liked
1:15:10Sheamus McGovern, CEO of Open Data Science, takes Jon Krohn and his listeners on a journey to launching his popular data science and AI conference, now in its tenth year, as well as the great shifts to the fields that he has seen on the way. For Seamus, the growth of his Open Data Science Conference has shown him that an AI engineer is just the beg…
…
continue reading
In this conversation, Dr. Caleb Scharf discusses the evolution of space exploration, drawing parallels to historical figures like Darwin. He explores the implications of humanity's expansion into space, the challenges of microgravity, and the allure of Mars as a potential habitat. Scharf emphasizes the interconnectedness of space exploration with o…
…
continue reading
In this episode, we will explore the Power and Essence of Knowing. Yes, Knowing holds a supreme position—it is truly the master. While it may seem simple to say that Knowing is simply “to know,” there is a much deeper dimension to this concept. For students of Veydaantaa, Knowing is synonymous with Consciousness. It is regarded as one of the most p…
…
continue reading
1
932: Should You Build or Buy Your AI Solution? With Larissa Schneider
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10Larissa Schneider speaks to Jon Krohn in this Feature Friday about finding the right time to invest in AI solutions, and when it’s better to build them yourself. She discusses her work leading global strategy and operations at Unframe, and how they raised $50 million in venture capital since the company’s launch in March 2025. Additional materials:…
…
continue reading
1
Episode 20 - ECC, Smart Grids, and Physical Sabotage
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
…
continue reading
1
Episode 19 - Systemic Security Failures and the Cyber-Physical War
42:15
42:15
Play later
Play later
Lists
Like
Liked
42:15This episode explores the core mechanisms, failures, and threats related to modern digital security, moving from mathematical foundations to real-world cyber warfare. The foundation of secure communication relies on cryptography, which is broadly split into symmetric ciphers (like AES) for high-speed confidentiality, and asymmetric ciphers (like RS…
…
continue reading
1
Episode 18 - Code Flaws, Metadata Wars, and Nation-State Cyber Warfare
43:34
43:34
Play later
Play later
Lists
Like
Liked
43:34This episode dives into the true state of digital security by examining the fundamental building blocks of cryptography, their inherent vulnerabilities, and the systemic threats that compromise them. The foundation of secure communication relies on ciphers like the symmetric Triple DES (3DES), which bought time by increasing the effective key size …
…
continue reading
1
931: Boost Your Profits with Mathematical Optimization, feat. Jerry Yurchisin
1:13:12
1:13:12
Play later
Play later
Lists
Like
Liked
1:13:12AI predictions, and how to act on them: Data Science Strategist at Gurobi, Jerry Yurchisin, speaks to Jon Krohn about how mathematical optimization helps enterprises automate decisions for business success and where to find the resources to make it happen. This episode is brought to you by the ODSC, the Open Data Science Conference, by Fabi, by D…
…
continue reading
1
"Faith in the Numbers" - Featuring Music's Mathematical Mastermind Mike Castronovo
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12On this rung of Next Rung Radio, we spotlight a visionary who stepped into the music industry not as an artist, but as the strategist who could see what was broken and dared to fix it. Mike Castronovo built his career in wealth management and international markets, mastering numbers the way musicians master notes. But when his daughter pursued musi…
…
continue reading
In this engaging conversation, Rachel Ignotofski discusses her new book Dinosaurs, exploring the fascination with these ancient creatures, the impact of mass extinctions, and the evolution of life on Earth. She highlights the importance of paleontology, the legacy of Mary Anning, and the artistic choices made in illustrating the book. The discussio…
…
continue reading
Implications of a mutation in modern humans Science Sessions are brief conversations with cutting-edge researchers, National Academy members, and policymakers as they discuss topics relevant to today's scientific community. Learn the behind-the-scenes story of work published in the Proceedings of the National Academy of Sciences (PNAS), plus a broa…
…
continue reading
1
Episode 17 - Beyond the Math: Dissecting Crypto's Achilles' Heel
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
…
continue reading
1
Episode 16 - The Irony of Crypto: Why Key Management Causes Massive Data Breaches
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
…
continue reading
1
Episode 15 - The Math, The Mallory, and the Mode Misuse
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
…
continue reading
1
Episode 14 - Crypto-Agility Nightmare: Why Trillions of Systems Can't Easily Swap Keys
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
…
continue reading
1
Episode 13 - Why Bad Code, Not Broken Math, Is the Real Security Threat
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
…
continue reading
1
Episode 12 - Cryptography and Systemic Cyber Defense
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
…
continue reading
1
Episode 11 - Zero-Knowledge, Quantum Chaos, and Unmanageable Complexity
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
…
continue reading
1
Episode 10 - The Bit, The Seed, and the Paradox of Data Flow
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
…
continue reading
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
…
continue reading
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
…
continue reading
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
…
continue reading
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
…
continue reading
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
…
continue reading
1
Episode 4 - PKI, Quantum Threats, and the Configuration Crisis
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
…
continue reading
1
Episode 3 - The Secret History of Encryption, Power, and the Race for Digital Keys
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
…
continue reading
1
Episode 2 - Cryptography's Engineering of Trust
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03This episode explores the core principles of cryptography, emphasizing that true security is rooted not just in strong math but in meticulous engineering and key management. The efficiency of modern encryption largely relies on symmetric ciphers like AES and 3DES, which use the same secret key for both encryption and decryption. A critical challeng…
…
continue reading
1
Episode 1 - The Protocol Paradox in Cryptography and System Security
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54This episode dives into the Protocol Paradox, which states that the security of systems built on the mathematical bedrock of cryptography is constantly undermined by flaws in the implementation and surrounding processes. Cryptographic algorithms are theoretically strong because they rely on computationally hard math problems, but successful attacks…
…
continue reading
1
Trailer - Secure Math Collapses in the Real World
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04This episode explores the significant gap between the theoretical security of cryptography, based on complex mathematics like modular arithmetic and computationally hard problems, and the messy reality of real-world digital security. Cryptographic algorithms are tested against theoretical attacks, aiming to make it mathematically impossible to reve…
…
continue reading
In this episode, we will explore the connection between dark energy and space. Scientific research suggests that dark energy constitutes about 79% of the total energy present in the universe. It is referred to as "dark" because it cannot be directly detected, yet its presence is undeniable. Without dark energy, the universe would not be able to sus…
…
continue reading
1
930: In Case You Missed It in September 2025
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25Jon Krohn’s highlights from this month of interviews focus on ways to future-proof your career, looking at the hardware that will get you the most mileage, the emerging roles that are well worth a look, and the developments in AI that will endure in a field constantly testing the durability of its own breakthroughs. Additional materials: …
…
continue reading
1
929: Dragon Hatchling: The Missing Link Between Transformers and the Brain, with Adrian Kosowski
1:14:28
1:14:28
Play later
Play later
Lists
Like
Liked
1:14:28By Jon Krohn
…
continue reading
1
"When God Says Know" - Featuring Grammy Nominated songwriter | 2X Cancer Survivor Dave Staton
39:53
39:53
Play later
Play later
Lists
Like
Liked
39:53By Ron Creech
…
continue reading
By Breaking Math
…
continue reading
In this episode, we will explore the concept that Awareness is the fundamental Reality underlying all existence. It serves as the foundation for everything in the universe. This Reality expresses itself in three distinct forms: 1. Self-Awareness 2. Reflected Awareness 3. Refracted Awareness. These correspond to SatChitAnanda, Ishvara, and Guru, res…
…
continue reading
1
928: The “Lethal Trifecta”: Can AI Agents Ever Be Safe?
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55Prompt injections, malicious code, and AI agents: In this week’s Five-Minute Friday, Jon Krohn looks into the current security weaknesses found in AI systems. A structural vulnerability that The Economist dubs a “lethal trifecta” could cause havoc for AI users, unless we take the necessary steps to contain our systems. Additional materials: …
…
continue reading
1
"Legacy Over Labels" - Featuring Award Winning Producer | Engineer David Browning
35:44
35:44
Play later
Play later
Lists
Like
Liked
35:44On this rung of Next Rung Radio, we welcome a man whose fingerprints are all over some of the biggest names in music. David Browning has spent more than 30 years as a producer, performer, and songwriter, working alongside artists like Katy Perry, Natalie Grant, and C.C. Winans. But his story goes far beyond studio walls and stages. He’s walked hand…
…
continue reading
1
"Faith, Rodeo & Redemption" - Featuring Bullrider | Cancer Surviver | Songwriter Cayden Gillard
35:12
35:12
Play later
Play later
Lists
Like
Liked
35:12Welcome to the very first official episode of Next Rung Radio Podcast, where every rung on the ladder is another step toward purpose, power, and resilience. To kick off this journey, we’re joined by country artist and survivor Cayden Gillard — a man who embodies what it means to rise through adversity. From a leukemia diagnosis at just 14, to picki…
…
continue reading
1
927: Automating Code Review with AI, feat. CodeRabbit’s David Loker
1:19:18
1:19:18
Play later
Play later
Lists
Like
Liked
1:19:18By Jon Krohn
…
continue reading