Chapter

Business Guy vs. Technical Guy
listen on Spotify
1:10:18 - 1:20:02 (09:43)

The clash between business priorities and technical priorities within a startup can lead to conflict and difficulty in implementing the correct solution.

Clips
The episode discusses emerging technologies in computing hardware and networking beyond the computer industry, including cell phones, elevators, locomotives, and audio and video equipment, and how Java programming language plays an important role in these innovations.
1:10:18 - 1:13:34 (03:15)
listen on Spotify
Java
Summary

The episode discusses emerging technologies in computing hardware and networking beyond the computer industry, including cell phones, elevators, locomotives, and audio and video equipment, and how Java programming language plays an important role in these innovations.

Chapter
Business Guy vs. Technical Guy
Episode
#126 – James Gosling: Java, JVM, Emacs, and the Early Days of Computing
Podcast
Lex Fridman Podcast
The speaker shares how he observed companies doing all the common networking things that were done 20 years before during his visits to different companies like Samsung and European companies, leading to a repetition of disasters in the computer science industry.
1:13:35 - 1:17:10 (03:34)
listen on Spotify
Computer Science Industry
Summary

The speaker shares how he observed companies doing all the common networking things that were done 20 years before during his visits to different companies like Samsung and European companies, leading to a repetition of disasters in the computer science industry.

Chapter
Business Guy vs. Technical Guy
Episode
#126 – James Gosling: Java, JVM, Emacs, and the Early Days of Computing
Podcast
Lex Fridman Podcast
The number one source of security vulnerabilities is pointers used in software development, and implementing proper security and safety requirements is crucial during the software development process.
1:17:12 - 1:20:02 (02:49)
listen on Spotify
software development
Summary

The number one source of security vulnerabilities is pointers used in software development, and implementing proper security and safety requirements is crucial during the software development process.

Chapter
Business Guy vs. Technical Guy
Episode
#126 – James Gosling: Java, JVM, Emacs, and the Early Days of Computing
Podcast
Lex Fridman Podcast