The Race to Zero


4 mins

Build System Background Enterprise build systems are, by design and necessity, bespoke implementations. While many enterprises do indeed utilize the same core feature set - i.e. clone a repo & then iterate through a series of predefined tasks - this accounts for around 75% of the functionality that a build system has to possess. The results delivered in that last 25% require enormous customization and thus ensure that no two build systems will ever be the same.

Open Source Competitive Moats


6 mins

I’ve recently been thinking about how companies that both produce and consume open source software (OSS) behave in the markets that develop around them. This post examines the incentives on both sides - and considers multiple third sides - to gain advantage from use of OSS in enterprises. The obvious first order case of advantage is using OSS because it’s free of ongoing license costs. This is true for SMB but less so for enterprises that purchase licenses for versions of the OSS that contain proprietary features.

Amazon


1 mins

recorded on iMac using the chrome browser. Okay, this is a post that probably guarantees I never get hired by Amazon, which is amusing since I went through that process back in May and got a rejection. I already talked about that. A friend messaged me about 15 minutes ago and pointed me to Cory Quinn’s post this morning about why he turned down a job offer at AWS.

How This Works


1 mins

recorded on the iPhone using Tincup Voice in the safari browser Tincup Voice is pretty easy to use. You go to the web form on your iphone using safari, supply a post title, your user name and your email address and click the record button and begin speaking. Once you’re done speaking, you click the stop record button and the recording that you’ve just made is sent to S3 and from there is sent into the transcription service.

Integrity


2 mins

recorded on iPhone using the default Safari browser This is a post about integrity. A couple of days ago, there was news that Capital One credit card company had been hacked.  A former AWS engineer utilized her knowledge of how AWS works to gain access to one of the AWS roles that Capital One used to store customer data in S3, which is their simple storage service. Once she gained access to that account, or pardon me, that role she was able to download just scores and scores and scores of customer data files from S3.