Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Jared

๐Ÿ‘ค Speaker
5113 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Like that's my argument is like you will have a version of that for people. I'm not saying you won't, but those are the truck drivers and truck drivers have specific tools they use in order to drive their trucks better. You know, like remember that guy who's got the Sylvester Stallone, you know, he had that built in over the top. What is this?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Like that's my argument is like you will have a version of that for people. I'm not saying you won't, but those are the truck drivers and truck drivers have specific tools they use in order to drive their trucks better. You know, like remember that guy who's got the Sylvester Stallone, you know, he had that built in over the top. What is this?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's a more practical example. I was going for the movie reference. Remember over the top guys were Sylvester Stallone. He's got this built into his truck. He would like, he was an arm wrestler and he would use one hand and all day long while he drove, he would just be making that one arm strong, you know, take my strong arm and he would become the best arm wrestler.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

That's a more practical example. I was going for the movie reference. Remember over the top guys were Sylvester Stallone. He's got this built into his truck. He would like, he was an arm wrestler and he would use one hand and all day long while he drove, he would just be making that one arm strong, you know, take my strong arm and he would become the best arm wrestler.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It was basically a Rocky ripoff. Like Rocky was really successful. He's like, let's do it again with arm wrestling. And so he had a very specific thing in his truck where he could just like work out.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

It was basically a Rocky ripoff. Like Rocky was really successful. He's like, let's do it again with arm wrestling. And so he had a very specific thing in his truck where he could just like work out.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

he would get serious all of a sudden and he would move his hands. It was like his killer move. You seen this movie?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

he would get serious all of a sudden and he would move his hands. It was like his killer move. You seen this movie?

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

He would like, no, but like change his grip.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

He would like, no, but like change his grip.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But yeah, yours is much more salient reference, which is specific tooling and testing and training that truck drivers receive in order to drive trucks well. And everybody else, you know, we just, sure we got driver's licenses, but we just hop in a car and drive, you know, we don't care about trucks.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

But yeah, yours is much more salient reference, which is specific tooling and testing and training that truck drivers receive in order to drive trucks well. And everybody else, you know, we just, sure we got driver's licenses, but we just hop in a car and drive, you know, we don't care about trucks.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And specific skilled users have their options as well and better education and they should know their choices of password managers and they should know this kind of stuff. And the people driving the trucks today, the desktop CCs and the MacBooks and stuff are sophisticated users who are usually working. I mean, most people are creating...

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

And specific skilled users have their options as well and better education and they should know their choices of password managers and they should know this kind of stuff. And the people driving the trucks today, the desktop CCs and the MacBooks and stuff are sophisticated users who are usually working. I mean, most people are creating...

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Even today, a lot of creation is happening on device, but on smartphone, but are actually like, this is the working class people. And it's not, I don't care about them is that I think that they are educated in ways that they can, they can listen to the change log and just know all this stuff.

The Changelog: Software Development, Open Source
Over the top auth strategies (Friends)

Even today, a lot of creation is happening on device, but on smartphone, but are actually like, this is the working class people. And it's not, I don't care about them is that I think that they are educated in ways that they can, they can listen to the change log and just know all this stuff.