Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Rust And Wind Podcasts

show episodes
 
Artwork

1
Rust and Wind

an Out There Recordings podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast that explores street musicians and their music, all recorded in the field. The name is a tip of the hat to the majority of instruments I find being played in the streets. They often rely on metal strings, or wind to play.
  continue reading
 
Loading …
show series
 
Send us a text We hope you are enjoying the Road Snack episodes! In this festive episode, Mary and Haley explore various Christmas traditions, including the enchanting legend of tinsel, the ancient practice of wassailing with a horse skull, and the eerie tale of the Drekavac, a cryptid associated with unbaptized souls. Don't forget to hit that subs…
  continue reading
 
Send us a text In this episode of Rebel Road, hosts Mary and Haley delve into the complex and often misunderstood topic of demons. They explore the biblical definitions, cultural contexts, and the distinctions between demons and fallen angels. The conversation covers the nature of possession, the historical significance of the Nephilim, and the var…
  continue reading
 
Send us a text In this mini Road Snack episode, Haley and Mary discuss Gryla, the Christmas witch from Iceland, and her family, the Yule Cat and the Yule Lads. The discussion highlights the blend of pagan and Christian traditions that shape modern Christmas celebrations, while also emphasizing the dark and eerie nature of these holiday tales. Be su…
  continue reading
 
Send us a text In this special Road Snack edition of Christmas creatures, Mary and Haley explore the legend of Baba Yaga, a fearsome witch from Slavic folklore. The conversation highlights the eerie aspects of her story, her magical hut, and the perils of finding Baba Yaga. Don't get lost in the woods this winter solstice! Be sure to hit that subsc…
  continue reading
 
From early 2022 through late 2024, a group of threat actors publicly known as APT28 exploited known vulnerabilities, such as CVE-2022-38028, to remotely and wirelessly access sensitive information from a targeted company network. This attack did not require any hardware to be placed in the vicinity of the targeted company's network as the attackers…
  continue reading
 
Send us a text In this episode, Mary and Haley explore the origins of the Nephilim, the hybrid offspring of the Watchers and human women, and the subsequent consequences of their existence. What exactly were giants? They take a quick look into giants in the US, and share some old and modern tales of giants. Join them for a quick tour into the topic…
  continue reading
 
Send us a text Welcome to Road Snacks! In these bite sized episodes, Mary and Haley explore the darker side of Christmas traditions, discussing various mythical creatures associated with the season. Road Snacks will be released every week the month of December for FREE! Our way of thanking you for listening! Be sure you hit that subscribe button so…
  continue reading
 
Send us a text Join Haley and Mary as they discuss fear, from the biblical tale of Goliath to the horrors of war. They discuss nightmares, the science behind fear, and how it can be both a natural and supernatural phenomenon. Emphasizing the importance of recognizing and confronting fear, they touch on myths and legends surrounding fear throughout …
  continue reading
 
Modern data analytic methods and tools—including artificial intelligence (AI) and machine learning (ML) classifiers—are revolutionizing prediction capabilities and automation through their capacity to analyze and classify data. To produce such results, these methods depend on correlations. However, an overreliance on correlations can lead to predic…
  continue reading
 
How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
  continue reading
 
Send us a text In our first episode {yay!}, Mary and Haley, dive into the realms of the supernatural, discussing topics such as demonology, necromancy, and personal experiences with the uninvited. They explore the case of Stephen Zellner, who faced dire consequences after engaging with spirits, and emphasize the importance of caution when dealing w…
  continue reading
 
Software bills of materials or SBOMs are critical to software security and supply chain risk management. Ideally, regardless of the SBOM tool, the output should be consistent for a given piece of software. But that is not always the case. The divergence of results can undermine confidence in software quality and security. In our latest podcast from…
  continue reading
 
Send us a text Rebel Road is a bi-weekly podcast for anyone who loves digging into the dark and unexplained. Join hosts Mary and Haley for a wide range of the mysterious. From "alternative" theories, supernatural evil, cryptids, digging into obscure biblical texts and more. They bring the supernatural to life with vivid story telling, personal expe…
  continue reading
 
Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
  continue reading
 
Artificial intelligence (AI) is a transformational technology, but it has limitations in challenging operational settings. Researchers in the AI Division of the Carnegie Mellon University Software Engineering Institute (SEI) work to deliver reliable and secure AI capabilities to warfighters in mission-critical environments. In our latest podcast, M…
  continue reading
 
A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust adoption remain, particularly in safety-critical systems, where features such as memory and processing power are in short supply and compliance with regulations is mandatory. In our latest podcast from t…
  continue reading
 
In response to Executive Order (EO) 14028, Improving the Nation's Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Ale…
  continue reading
 
Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images is becoming a critical step in protecting the software supply chain. In practice, however, builds are often not reproducible due to elements of the build environment that rely on nondeterministic factors such …
  continue reading
 
Software enables our way of life, but market forces have sidelined security concerns leaving systems vulnerable to attack. Fixing this problem will require the software industry to develop an initial standard for creating software that is secure by design. These are the findings of a recently released paper coauthored by Greg Touhill, director of t…
  continue reading
 
A January 2025 Defense Innovation Board study on scaling nontraditional defense innovation stated, "We must act swiftly to ensure the DoD leads in global innovation and competition over AI and autonomous systems – and is a trendsetter for their responsible use in modern warfare." In this podcast from the Carnegie Mellon University Software Engineer…
  continue reading
 
Warfighters in the Department of Defense (DoD) operate in high-stakes environments where security, efficiency, and speed are critical. In such environments DevSecOps has become crucial in the drive toward modernization and overall mission success. A recent study led by researchers at the Carnegie Mellon University Software Engineering Institute (SE…
  continue reading
 
Deploying cloud-centric technologies such as Kubernetes in edge environments poses challenges, especially for mission-critical defense systems. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Patrick Earl, Doug Reynolds, and Jeffrey Hamed, all DevOps engineers in the SEI's Software Solutions Division, sit d…
  continue reading
 
A strong cyber defense is vital to public- and private-sector activities in the United States. In 2019, in response to an executive order to strengthen America's cybersecurity workforce, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) partnered with the SEI to develop and run the President's Cup Cyberse…
  continue reading
 
Evaluating source code to ensure secure coding qualities costs time and effort and often involves static analysis. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making some exciting updates to the SEI CERT C …
  continue reading
 
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division, sits down with Matthew Butkovic, technical director of Cyber Risk and Resilience at CERT, to discuss ways in which CERT researchers and technologists are working to deliver rapid capability to warfighters in …
  continue reading
 
Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from the Carnegie Mellon University Software Engineering Institute, Austin Whisnant and Dan Costa discuss the Insider Incident Data Expression Standard (IIDES), a new schema for collecting and sharing data about insid…
  continue reading
 
Grace Lewis, a principal researcher at the Carnegie Mellon University Software Engineering Institute (SEI) and lead of the SEI's Tactical and AI-Enabled Systems Initiative, was elected the 2026 president of the IEEE Computer Society (CS), the largest community of computer scientists and engineers, with more than 370,000 members around the world. In…
  continue reading
 
Machine learning (ML) models commonly experience issues when integrated into production systems. In this podcast, researchers from the Carnegie Mellon University Software Engineering Institute and the U.S. Army AI Integration Center (AI2C) discuss Machine Learning Test and Evaluation (MLTE), a new tool that provides a process and infrastructure for…
  continue reading
 
As software size, complexity, and interconnectedness has grown, software modernization within the Department of Defense (DoD) has become more important than ever. In this discussion moderated by Matthew Butkovic, technical director of risk and resilience in the SEI CERT Division, SEI director Paul Nielsen outlines the SEI's work with the DoD on sof…
  continue reading
 
Containerization allows developers to run individual software applications in an isolated, controlled, repeatable way. With the increasing prevalence of cloud computing environments, containers are providing more and more of their underlying architecture. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Sasa…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play