Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing

Jared

👤 Person
4201 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

He would like, no, but like change his grip.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

He would like, no, but like change his grip.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But yeah, yours is much more salient reference, which is specific tooling and testing and training that truck drivers receive in order to drive trucks well. And everybody else, you know, we just, sure we got driver's licenses, but we just hop in a car and drive, you know, we don't care about trucks.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But yeah, yours is much more salient reference, which is specific tooling and testing and training that truck drivers receive in order to drive trucks well. And everybody else, you know, we just, sure we got driver's licenses, but we just hop in a car and drive, you know, we don't care about trucks.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And specific skilled users have their options as well and better education and they should know their choices of password managers and they should know this kind of stuff. And the people driving the trucks today, the desktop CCs and the MacBooks and stuff are sophisticated users who are usually working. I mean, most people are creating...

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And specific skilled users have their options as well and better education and they should know their choices of password managers and they should know this kind of stuff. And the people driving the trucks today, the desktop CCs and the MacBooks and stuff are sophisticated users who are usually working. I mean, most people are creating...

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Even today, a lot of creation is happening on device, but on smartphone, but are actually like, this is the working class people. And it's not, I don't care about them is that I think that they are educated in ways that they can, they can listen to the change log and just know all this stuff.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Even today, a lot of creation is happening on device, but on smartphone, but are actually like, this is the working class people. And it's not, I don't care about them is that I think that they are educated in ways that they can, they can listen to the change log and just know all this stuff.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Exactly. There's companies out there who specialize in this stuff.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Exactly. There's companies out there who specialize in this stuff.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But isn't the money an enterprise? I mean...

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But isn't the money an enterprise? I mean...

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's because we are the truck drivers of the software world. Yeah. And we can even be a little over the top every once in a while.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's because we are the truck drivers of the software world. Yeah. And we can even be a little over the top every once in a while.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Dan, if you were starting a software business today and you wanted people to authenticate against your website in order to do stuff and you make money once they're signed in and you want to make sure that they can get it in and they can get their stuff, but also their stuff secure. And like, what would your solution look like for a developer trying to build today?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Dan, if you were starting a software business today and you wanted people to authenticate against your website in order to do stuff and you make money once they're signed in and you want to make sure that they can get it in and they can get their stuff, but also their stuff secure. And like, what would your solution look like for a developer trying to build today?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So there is no silver bullet. I was hoping you'd just give us one. You could just tell us what to do. Dan Moore told me to do this, and so I'm going to do it. But no, I had to actually think about my own use case and apply thought processes. That's no fun.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

So there is no silver bullet. I was hoping you'd just give us one. You could just tell us what to do. Dan Moore told me to do this, and so I'm going to do it. But no, I had to actually think about my own use case and apply thought processes. That's no fun.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Oh, I didn't say... No, he was going to say listener and user. He was going to say listener and he was going to say user. And he called them losers.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Oh, I didn't say... No, he was going to say listener and user. He was going to say listener and he was going to say user. And he called them losers.