Recent Episodes
Episode 450: Hadley Wickham on R and Tidyverse

Hadley Wickham Chief Scientist of RStudio and creator of the Tidyverse discusses how R and its data science package the TidyVerse are used and created. Host Felienne spoke with Wickham about the design philosophy of the Tidyverse, and how it supports the clean and reproducible analysis of data. They discuss how different fields use data […]
Episode 449: Dan Moore on Build vs Buy

Dan Moore, cofounder of Vaporware, talks with host Adam Conrad about building software in-house versus buying off-the-shelf software from vendors. Moore explains the benefits, drawbacks, checklists, and frameworks for choosing when to build your own software solutions and when you should reach out to outside vendor solutions, as well as which vendor to choose and […]
Episode 448: Matt Arbesfeld on Starting Your Own Software Company

Matt Arbesfeld is the cofounder of LogRocket, a funded startup designed to help front-end developers debug issues faster. Host Adam Conrad spoke with Arbesfeld about building a software startup as a software engineer. Arbesfeld explained about finding his cofounder, solving problems you’re passionate about, hiring your first team members, and the downsides of starting a […]
Episode 447: Michael Perry on Immutable Architecture

Michael L. Perry discusses his recently published book, The Art of Immutable Architecture. Using familiar examples such as git and blockchain, he distinguishes immutable architecture from other approaches and addresses possible misunderstandings about designing an architecture for immutability. Michael and host Jeff Doolittle also examine other relevant topics such as location independence, conflict-free replicated data […]
Episode 446: Nigel Poulton on Kubernetes Fundamentals

Nigel Poulton, author of The Kubernetes Book and Docker Deep Dive, discusses Kubernetes fundamentals, why Kubernetes is gaining so much momentum, and why it’s considered “the” Cloud OS. Host Gavin Henry spoke with Poulton about when to use Kubernetes, the different ways to deploy it, the protocols involved, security considerations, pods, sidecars, the RAFT protocol, […]