Toots from 2024-05-22#
“What I’m really doing is changing the engineering culture at OpenSesame. Culture doesn’t c…#
“What I’m really doing is changing the engineering culture at OpenSesame. Culture doesn’t change easily. It tends to snap back. True change involves changing hundreds of little day-to-day decisions. That’s hard, even when people want to make those changes, and full buy-in is hard to come by.”
https://www.jamesshore.com/v2/blog/2024/a-software-engineering-career-ladder
Mastodon Source 🐘#
“The Golden Path — as we define it today — is the ‘opinionated and supported’ path to …#
“The Golden Path — as we define it today — is the ‘opinionated and supported’ path to ‘build something’ (for example, build a backend service, put up a website, create a data pipeline). The Golden Path tutorial is a step-by-step tutorial that walks you through this opinionated and supported path.”
Mastodon Source 🐘#
“If the timeframe is less than a month, don’t hire anyone–you won’t get the ROI. If the timefr…#
“If the timeframe is less than a month, don’t hire anyone–you won’t get the ROI. If the timeframe is less than 6 months, hire the senior–you won’t get the ROI from the juniors in that short a timeframe. Otherwise, hire the juniors.”
http://blogs.newardassociates.com/blog/2024/engineering-manager-challenge.html
Mastodon Source 🐘#
“I’ve used lots of bad websites in my life. Hell, I’ve made a lot of bad websites in my life. B…#
“I’ve used lots of bad websites in my life. Hell, I’ve made a lot of bad websites in my life. But never before have I seen a website that so completely expresses just the pure hatred of users like this one. Everything was as poorly designed as possible, with user hostile design at every corner.”
https://matduggan.com/the-worst-website-in-the-entire-world/
Mastodon Source 🐘#
“The real problem here is the same one that plagued the pre-SS7 phone network: the commingling …#
“The real problem here is the same one that plagued the pre-SS7 phone network: the commingling of data and commands. As long as the data—whether it be training data, text prompts, or other input into the LLM—is mixed up with the commands that tell the LLM what to do, the system will be vulnerable.”
https://www.schneier.com/blog/archives/2024/05/llms-data-control-path-insecurity.html
