
Sign up to save your podcasts
Or


In this Programming By Stealth adjacent installment labeled Tidbits 3 of Y, Bart Busschots talks to us about the dangers of using other people's code in your code, and the danger of not using other people's code. He explains this seeming dichotomy and gives us ways to approach the problem taking a middle ground. He helps us think about how to choose whether to use other's code and whose code to use, and even how to ensure it's kept up to date with security patches. It's definitely a philosophical installment and it was triggered by a recent event where a developer maliciously broke his own code, impacting a lot of developers. It's actually sort of a success story of open source which I didn't expect.
You can find Bart's fabulous tutorial shownotes at pbs.bartificer.net.
By Allison Sheridan4.8
99 ratings
In this Programming By Stealth adjacent installment labeled Tidbits 3 of Y, Bart Busschots talks to us about the dangers of using other people's code in your code, and the danger of not using other people's code. He explains this seeming dichotomy and gives us ways to approach the problem taking a middle ground. He helps us think about how to choose whether to use other's code and whose code to use, and even how to ensure it's kept up to date with security patches. It's definitely a philosophical installment and it was triggered by a recent event where a developer maliciously broke his own code, impacting a lot of developers. It's actually sort of a success story of open source which I didn't expect.
You can find Bart's fabulous tutorial shownotes at pbs.bartificer.net.

827 Listeners

163 Listeners

1,288 Listeners

251 Listeners

33 Listeners

20 Listeners

896 Listeners

568 Listeners

21 Listeners

46 Listeners

72 Listeners

1,210 Listeners

175 Listeners

30 Listeners

15 Listeners

38 Listeners