Kind likes

 Like

Liked a post on Twitter
Post details

 Like

Liked Paul Johnston (@pauldjohnston@mastodon.green)
Post details
Attached: 1 image Well played sir. Public sector tech jobs are woefully underpaid. There are some good tech people who work in the civil service. And there are a lot of consultants. If they paid better... maybe there would be fewer consultants. But then the civil service would be larger. --- RT @AlexSelbyB @Jontafkasi https://t.co/jGd6tWMH1T https://twitter.com/AlexSelbyB/status/1641371440871079937

 Like

Liked a post on Twitter
Post details

 Like

Liked Mark (@computerist@mastodon.social)
Post details
OK, let's debate a definition. Today, let's talk about "vulnerability" in software. Your product, (let's call it A) uses a library (which we'll call X). X has a load of features. Among those is some function, "someFunc" which has a bug. It's supposed to be safe to call with untrusted data... but some clever researchers have found that they can craft input that results in remote code execution (RCE). X has a vulnerability. Does A?

 Like

Liked Jeffrey Lembeck (@jefflembeck@fediverse.jefflembeck.com)
Post details
Back when Raquel Vélez was my boss at npm, inc., she had a name for when somebody would give you an ill-defined task and then would get upset when you didn't do it "right." She called it "Bring me a rock." When I asked her what that meant, she would say "Bring me a rock... no, not that one." It was a pretty clear example. She recognized quickly that I hate, with all of me, "Bring me a rock." It's the least good game. Anyway, was thinking about that tonight. Everybody should use that.