Taming the Chaos: Can we build systems that actually work?

Video thumbnail (Frame 0) Video thumbnail (Frame 1261) Video thumbnail (Frame 2540) Video thumbnail (Frame 3829) Video thumbnail (Frame 5112) Video thumbnail (Frame 6790) Video thumbnail (Frame 9092) Video thumbnail (Frame 10216) Video thumbnail (Frame 11487) Video thumbnail (Frame 13368) Video thumbnail (Frame 14519) Video thumbnail (Frame 16378) Video thumbnail (Frame 17639) Video thumbnail (Frame 19113) Video thumbnail (Frame 20343) Video thumbnail (Frame 21603) Video thumbnail (Frame 23639) Video thumbnail (Frame 25111) Video thumbnail (Frame 27878) Video thumbnail (Frame 30354) Video thumbnail (Frame 31785) Video thumbnail (Frame 32911) Video thumbnail (Frame 34137) Video thumbnail (Frame 36323) Video thumbnail (Frame 37502) Video thumbnail (Frame 38962) Video thumbnail (Frame 41502) Video thumbnail (Frame 42891) Video thumbnail (Frame 44068) Video thumbnail (Frame 45966) Video thumbnail (Frame 47665) Video thumbnail (Frame 49577) Video thumbnail (Frame 51891) Video thumbnail (Frame 55020) Video thumbnail (Frame 56200) Video thumbnail (Frame 57980) Video thumbnail (Frame 59494) Video thumbnail (Frame 61412) Video thumbnail (Frame 62622) Video thumbnail (Frame 64321) Video thumbnail (Frame 65898) Video thumbnail (Frame 67021) Video thumbnail (Frame 68662) Video thumbnail (Frame 70307) Video thumbnail (Frame 71625) Video thumbnail (Frame 73100) Video thumbnail (Frame 74993) Video thumbnail (Frame 76128) Video thumbnail (Frame 79137) Video thumbnail (Frame 80686) Video thumbnail (Frame 81920) Video thumbnail (Frame 83595) Video thumbnail (Frame 84773) Video thumbnail (Frame 86431) Video thumbnail (Frame 87678)
Video in TIB AV-Portal: Taming the Chaos: Can we build systems that actually work?

Formal Metadata

Title
Taming the Chaos: Can we build systems that actually work?
Subtitle
Possible paths from today's ghastly hackery to what computing should be
Title of Series
Author
License
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
2018
Language
English

Content Metadata

Subject Area
Abstract
We rely on mainstream computer engineering every day, but it's insanely complex, poorly understood, unreliable, and, as CCC reminds us every year, chronically insecure. This talk will explain some ways that we can do better: taming parts of this this chaos with precise understanding - illustrated with disturbing facts and clean models for current architectures and the C language, from the REMS project, and principled but pragmatic new alternatives, that build in more hardware and software security protection,as developed in the CHERI project.
Keywords Resilience

Related Material

The following resource is accompanying material for the video
Video is cited by the following resource
Semiconductor memory
Wechselseitige Information Moment of inertia MIDI Maxima and minima Menu (computing) Chaos theory Color management Gamma function Window
Operations research Kolmogorov complexity Line (geometry) Discrete group Calculation Code Continuous function Semiconductor memory Number Read-only memory Estimation Interface (computing) Software testing Babbage, Charles
Computer
Kolmogorov complexity Discrete group Software testing Semiconductor memory Continuous function
Kolmogorov complexity Discrete group Interface (computing) Software testing Information security Continuous function
Kolmogorov complexity Interface (computing) Software testing Information security Oracle Proof theory
Kolmogorov complexity Discrete group Interface (computing) Software testing Continuous function
Operations research Number Read-only memory Calculation Semiconductor memory Babbage, Charles
Zoom lens View (database) Model theory Computer file Leak
Sign (mathematics) Zoom lens View (database) Model theory Computer file Kerberos <Kryptologie> Software maintenance Leak
Standard deviation Zoom lens View (database) Model theory Compiler Computer file Computer program Kerberos <Kryptologie> Leak
Standard deviation Zoom lens View (database) Compiler Model theory Computer file Computer program Kerberos <Kryptologie> Software maintenance Leak
Zoom lens Radical (chemistry) View (database) Model theory Computer file Software maintenance Leak
Enterprise architecture Scripting language Reduced instruction set computing POWER <Computerarchitektur> Kerberos <Kryptologie> Compiler Cohen's kappa Arm Virtual reality Read-only memory Speichermodell Speicherschutz Scale (map) Concurrency (computer science) Java applet Code Field (computer science) Device driver Power (physics) Moment of inertia Emulator System programming Theorem Information security Physical system Oracle Booting
Enterprise architecture Scripting language POWER <Computerarchitektur> Kerberos <Kryptologie> Compiler Cohen's kappa Arm Virtual reality Read-only memory Speichermodell Speicherschutz Scale (map) Concurrency (computer science) Java applet Code Field (computer science) Device driver Power (physics) Emulator Moment of inertia System programming Theorem Information security Physical system Oracle
Presentation of a group Neumann boundary condition Reduced instruction set computing Programmer (hardware) Moore's law View (database) Googol Computer hardware Barrelled space Arm Force ARPANET
Reduced instruction set computing Cursor (computers) Semantics (computer science) Scalability Higher-order logic Leak Architecture Emulator Function (mathematics) Computer hardware Fingerprint Formal grammar Extension (kinesiology) Speicherschutz
Architecture Reduced instruction set computing Computer hardware Scalability Fingerprint Speicherschutz
Sign (mathematics) System on a chip Sigma-algebra Leak
Sign (mathematics) System on a chip IRIS-T Hardware-in-the-loop simulation Maize Leak
Execution unit Temporal logic Sigma-algebra TLB <Informatik> Point (geometry) Code Encapsulation (object-oriented programming) Focus (optics) Software maintenance Leak Sign (mathematics) Mechanism design Pointer (computer programming) Virtual reality Resource allocation Read-only memory Pressure
Execution unit Temporal logic TLB <Informatik> Point (geometry) Code Encapsulation (object-oriented programming) Focus (optics) Mechanism design Pointer (computer programming) Virtual reality Resource allocation Read-only memory Pressure
Enterprise architecture Freeware Reduced instruction set computing Model theory Computer hardware Kernel (computing) Software Kerberos <Kryptologie> Field programmable gate array Spacetime Coprocessor Formal grammar
Enterprise architecture Freeware Computer hardware Kernel (computing) Software Kerberos <Kryptologie> Field programmable gate array Spacetime Coprocessor
Overhead (computing) Performance appraisal Freeware Computer file Code Spacetime Information security
Overhead (computing) Performance appraisal Freeware Computer file Code Spacetime Information security
Overhead (computing) Enterprise architecture Freeware Reduced instruction set computing Model theory Computer file Kerberos <Kryptologie> Code Field programmable gate array Coprocessor Semantics (computer science) Higher-order logic Emulator Computer hardware Kernel (computing) Function (mathematics) Software Theorem Spacetime Information security Formal grammar
Read-only memory Spherical cap Code Theorem Information security Exception handling Virtual machine Proof theory
Architecture Enterprise architecture Read-only memory Code Theorem Chaos theory Information security Semiconductor memory Exception handling Abstraction Virtual machine Proof theory
Architecture Enterprise architecture Chaos theory Information security Abstraction
Cartesian closed category Semiconductor memory
Feedback