Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Dan Moore

👤 Person
204 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But I mean, I think if you are writing an app that is targeted for like small, medium business users in Germany, you should use Zing, right? Which is like a German social business network, right? Or if you're writing something that is going to be deployed to China, you should use WeChat. Or if you're writing something that's going to be aimed at business users in the US, you should use LinkedIn.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But I mean, I think if you are writing an app that is targeted for like small, medium business users in Germany, you should use Zing, right? Which is like a German social business network, right? Or if you're writing something that is going to be deployed to China, you should use WeChat. Or if you're writing something that's going to be aimed at business users in the US, you should use LinkedIn.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And... I think you should always have username and password as the baseline. And I think that you should offer other solutions that are going to reduce friction that let people choose. Because at the end of the day, again, this is from the lens of customer identity access management. You don't really care how people get in, right?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And... I think you should always have username and password as the baseline. And I think that you should offer other solutions that are going to reduce friction that let people choose. Because at the end of the day, again, this is from the lens of customer identity access management. You don't really care how people get in, right?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

You just want people to get in as quickly as possible so that you can get them to the value that they're actually hopefully going to pay you for.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

You just want people to get in as quickly as possible so that you can get them to the value that they're actually hopefully going to pay you for.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

I mean, I would love to... Actually, that would be a great thing to survey your listeners as well.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

I mean, I would love to... Actually, that would be a great thing to survey your listeners as well.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

I mean, I think that there's probably a chunk of folks that... do want to just use username and password, right? They want to put it into one password. And there's probably a chunk of folks who'd be happy to use Google too, because they have one personal Google account that they kind of hang everything off of. So, yeah. that gets back to effort, right?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

I mean, I think that there's probably a chunk of folks that... do want to just use username and password, right? They want to put it into one password. And there's probably a chunk of folks who'd be happy to use Google too, because they have one personal Google account that they kind of hang everything off of. So, yeah. that gets back to effort, right?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And so like, how much effort would it take for you to add those additional login methods to ChangeLog? And if the effort, this is why you paid the big bucks, right? Like, cause we're just guessing on what features are needed for the future. We can do surveys and ask people and whatnot, but you don't know. But just in password is such a baseline that it's hard for me to imagine

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And so like, how much effort would it take for you to add those additional login methods to ChangeLog? And if the effort, this is why you paid the big bucks, right? Like, cause we're just guessing on what features are needed for the future. We can do surveys and ask people and whatnot, but you don't know. But just in password is such a baseline that it's hard for me to imagine

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

I mean, I, for my work, we use Google workspace and I prefer that, right? Because that way it's just, it's super tied. And I know that I will always have access to my Google account as long as I'm an employee and I can always, if I get, if I lose access to it somehow, um,

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

I mean, I, for my work, we use Google workspace and I prefer that, right? Because that way it's just, it's super tied. And I know that I will always have access to my Google account as long as I'm an employee and I can always, if I get, if I lose access to it somehow, um,

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

know google locks me out or something at least i have recourse to my it admins right um personal is a little bit different you hear horror stories about people losing access to google account and then losing access to like you know years of photos and memories and documents etc but um i loved for my professional accounts if it's tied to my company i love to hang it off my google account

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

know google locks me out or something at least i have recourse to my it admins right um personal is a little bit different you hear horror stories about people losing access to google account and then losing access to like you know years of photos and memories and documents etc but um i loved for my professional accounts if it's tied to my company i love to hang it off my google account

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Every time you switch a machine, that should be the first thing you do when you set up a new machine, right, is log into changelog.com, and then you're good.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Every time you switch a machine, that should be the first thing you do when you set up a new machine, right, is log into changelog.com, and then you're good.