Items tagged with: developers
HN Discussion: https://news.ycombinator.com/item?id=19653875
Posted by rjzaworski (karma: 73)
Post stats: Points: 138 - Comments: 24 - 2019-04-13T16:18:19Z
#HackerNews #developers #dns #guide #web
Here’s what it looks like through dig.
$ dig pets.com
; <<>> DiG 9.10.3-P4-Ubuntu <<>> pets.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17431
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;pets.com. IN A ;; ANSWER SECTION:
pets.com. 9708 IN A 220.127.116.11 ;; Query time: 14 msec
;; SERVER: 127.0.1.1
;; WHEN: Mon Apr 08 21:03:43 PDT 2019
;; MSG SIZE rcvd: 53
Skip down to the QUESTION and ANSWER: we wanted pets.com, and we got back 18.104.22.168. That’s DNS in action, and most of the time we can and do take it for granted. Still, issues do arise. Most of our conscious interactions with DNS start with the word NXDOMAIN or a too-generous TTL. When something goes wrong, having a cursory understanding of what’s happening under the hood can be helpful in diagnosing, fixing, and (better yet) preempting issues in the firmament of the web.
Which is as good a place as any to start.
Layers on layers
You’re probably already on good terms with the Hypertext Transfer Protocol, HTTP, which packages up webpage content in a way that browsers (“user agents”, in the vernacular) can understand. HTTP doesn’t specify how the browser connects to a server, but another protocol–the Transmission Control Protocol, TCP–sure does. Then there’s the Internet Protocol (IP), which specifies how both client and server should be addressed, and beneath that a link layer to sort out the actual hardware.
For HTTP, the whole stack comes out something like this:
Layer Protocol Notes
Application HTTP Format data request and response
Transport TCP Deliver data between client and server
Internet IP Address client and server
Link Ethernet Map request to physical network
Layering of an HTTP request
There you have it–the protocol stack where a web developer will spend 95% of her working life. TCP/IP is the gold standard in connection management, and except for those times when full-duplex communication is worth the trouble or low latency is more important than, say, reliable delivery–more on that in a moment–it’s where the web developer’s web begins and ends.
Connections are overrated
DNS can use a similar TCP/IP stack, but being parts of a simple system, most DNS operations can also travel the wire on the Internet’s favorite Roulette wheel: the User Datagram Protocol, UDP.
On a good day, UDP is fast, simple, and stripped bare of unnecessary niceties like delivery guarantees and congestion management. But a UDP message may also never be delivered, or it may be delivered twice. It may never get a response, which makes for fun client design–particularly coming from the relatively safe and well-adjusted world of HTTP. With TCP, you get an established connection and all kinds of accommodations when Things Inevitably Go Wrong. UDP? “Best effort” delivery. Which means a packet thrown over the fence with a prayer for a soft landing.
There and back again, a DNS request
Let’s get down to DNS. The usual story plays out something like this:
1. You type "pets.com" into lynx (or whatever Chrome alternative the kids are using these days)
2. lynx asks a DNS “resolver” to identify the server containing "pets.com"
3. The resolver doesn’t know firsthand, but it can forward your request to a friendly neighborhood DNS nameserver
4. If the nameserver doesn’t know either, it can at least supply the address of another nameserver that might.
5. When that nameserver doesn’t know, it may throw in the towel and ask one of the web’s root servers to kindly please direct it to the name server responsible for the portion of the domain space beneath ".com"
6. The ".com" nameserver can identify an authoritative name server responsible for "pets.com", which can in turn provide an IP address for "pets.com"
7. Any upstream resolvers may cache the result for future reference.
The same process can also turn a host address back into the corresponding domain. This involves a cute little trick with a special domain (in-addr.arpa) and a timely inversion. Here’s a clue: 22.214.171.124.in-addr.arpa is the hostname of the public DNS server at 126.96.36.199.
With the IP reversed, the DNS zone just under in-addr.arpa maps to an entire network (8.in-addr.arpa) immediately beneath the top-level domain space and corresponding to the 188.8.131.52/8 block of IPv4 addresses.
An even more interesting feature of DNS is its assumption that at any given hop a domain will just as often not be known. This is where UDP suddenly seems like a better fit, both mechanically–datagrams being relatively lightweight travelers through an overworked network stack–but philosophically, too.
Couldn’t resolve a host? Well, your request probably never arrived, either. Better luck next time.
In the zone
Say the datagram did arrive, however, and it’s time to serve a request. When a query reaches an adequately capable nameserver, that server will understand its place in the great domain hierarchy through a “zone” that looks something like this:
$TTL 86400 ;1d
@ IN SOA ns1.pets.com. ns2.pets.com. ( 2019040700 ; se = serial number 43200 ; ref = refresh (12h) 900 ; ret = update retry (15m) 1209600 ; ex = expiry (2w) 3600 ; nx = nxdomain ttl (1h) ) IN NS ns1.pets.com. IN MX 10 mail.pets.com.
www IN CNAME @
If you’ve adjusted CNAME or TXT records in your domain registrar’s web interface, what you were actually editing were the resource records (“RR”s) in the underlying zone. When you hit “save”, the serial number (se) incremented to reflect the change. As clients everywhere evicted their last-retrieved cached copy of the pets.com zone, your new change (with its new serial) bubbled out across the internet, and some indeterminate time later it finished going “live”.
We’ll gloss over most of the details (see: diminishing returns), but this caching business is important. Every record in DNS land contains a TTL (“time to live”) indicating how long it may be cached by a client before it needs to be refreshed from a trustworthy server again. Where the TTL isn’t explicitly set, the default $TTL is used instead.
This caching thing is such serious business that even NXDOMAIN (“NX” as in, “non-existent”, as in, “try again later”) errors within the zone still have a lifetime. The general goal is to avoid repeating DNS request for as long as reasonably possible.
As our little tour has ventured forth from client to server and back, we haven’t once authorized a request. Assuming you know what to ask for, DNS is open to whoever comes a-knocking. This makes sense–it’s the Internet, after all–but it also has an interesting implication. Intentionally or otherwise, DNS has wound up with all the trappings of a lumbering, indispensable, distributed database. While we can use DNS to address friends and neighbors, we can also use it to establish trust (see DKIM and SPF), ownership, and the location of other interesting systems.
In web development, it’s easy to leave DNS as something to muddle through when absolutely needed. But just a bit of time invested in studying it and actually learning it shines some light on a fundamental, enduring part of the Internet’s plumbing. It’s worth a peek! And I’d love to know what you find.
HackerNewsBot debug: Calculated post rank: 100 - Loop: 180 - Rank min: 100 - Author rank: 146
Interviews with experienced software developers on moving to management
Article word count: 9
HN Discussion: https://news.ycombinator.com/item?id=19485559
Posted by siddhant (karma: 2137)
Post stats: Points: 161 - Comments: 65 - 2019-03-25T18:54:00Z
#HackerNews #became #developers #interviews #managers #who #with
Logo DEVELOPER TO MANAGER
* Browse Interviews * Share Your Advice * About
HackerNewsBot debug: Calculated post rank: 129 - Loop: 149 - Rank min: 100 - Author rank: 85
Define the goal:
To create a touchpad solution for Linux that serves as many users as possible, we want to be maximally objective in describing what we aim to deliver.
My first idea to be objective was to quantify how the cursor worked on OS X, and create a suite of tests we’d use to guide development. That turned out to be a misadventure, for circumstantial reasons.
My second idea is my current preferred plan forward:
1) to fork libinput (overview doc, contributor docs, source), and
2) find up to three developers dedicated to making a measurably better driver.
#Linux #touchpad #Macbook #libinput #developers
Easy to use tools for everyone in the open source ecosystem.
Maintainers... Launch a crowdfunding campaign, find mentees to help get more done, and get insight into code security,all for free.
Developers... Contribute to the open source projects you love by volunteering, mentoring, donating, or participating in local meetups.
Organizations... Get insights into the security of the projects you depend on, back your stack, and connect with rising talent to grow your team.
#CommunityBridge #developers #individuals #organizations #open source #technology #tools #computer #Linux #GNU #FOSS
Which websites featured on the Federation have the worst privacy?
My last post highlighted how ticking the OEmbed box to add a website picture to a post can compromise Federation users if it contains a tracker.
I also mentioned tools, like Disconnect, we could use to detect websites which track their users. In this post I reveal some of the most popular reference websites on the Federation with low privacy and high tracking rates.
I believe Federation users should consider not embedding, or at least warning their readers about the surveillance techniques carried out by these sites.
A Princeton University study identified almost a million websites that track their users. Here are just 5 examples of websites whose stories are commonly quoted on the Federation:
Wired is a popular website referenced on the Federation by many users because it publishes great tech-based stories. But how private is it?
Although it offers an ‘ad-free’ version for subscribers, normal visitors are ruthlessly fleeced for their data.
WIRED has embed deals (agreements to embed tracking codes into their pages for money or gain) with a staggering 171 third parties including Google, Amazon, Facebook, Vogue, GQ, Golf Digest, Bonappetit and Vanity Fair.
Some tracking beacons embedded on WIRED and captured by Ublock Origin
151 of these third parties are known tracking or advertising companies like Google, Amazon, Facebook, Turn, Add This, Scorecard Research, Adobe, Twitter Analytics, Typekit, Criteo and Quantserve. Aggressive trackers like Google Tag Manager (GTM), Add This and Turn are present here.
Below is a screengrab of the many scripts NoScript has blocked from the WIRED website, the 33 scripts, gifs and beacons blocked by Ublock Origin and a couple by Disconnect.
WIRED sets 25 short-term and 28 long-term cookies itself, while allowing its third party partners (including 69 tracking companies) to set 26 short-term and 133 long-term cookies.
It uses Google Analytics without the anonymization feature enabled, so user details are sent to Google servers.
All WIRED servers are based in the US so GDPR privacy rules can be ignored.
Websites loading this many scripts/cookies are usually blacklisted by most users, not least because they drain a device’s battery.
WIRED claims that subscribing with them will mean an ad free experience, but I find it hard to believe that a subscription to WIRED will suddenly load a clean page without a single tracker retrieving data. But then I am not a WIRED subscriber. Please comment if you are and have no trackers.
Seen by some as a safe pro-privacy resource celebrating Free and Open Source Software, FOSSPOST lets its users down by digitally fingerprinting their devices and loading 19 trackers into a browser.
FOSSPOST has embed deals with 27 third parties, making its embed renting in the ‘low’ category, including Google, Amazon, Creative Commons and WordPress.
13 of these are known tracking or advertising companies like Google, Amazon, Mailerlite, One Signal and the data-hungry caterpillar that is WordPress.
FOSSPOST sets 2 short-term and 2 long-term cookies itself while allowing its third party partners (including 3 tracking companies) to set 4 long-term cookies.
It uses Google Analytics without the anonymization feature so user details are sent to Google servers. All FOSSPOST servers are based in the US so GDPR privacy rules can be ignored.
Acquired by Yahoo’s parent company, Oath (a company that includes AOL), under the Verizon umbrella, in 2010, this is a popular reference source for researchers and Federation users.
Historically, Yahoo deserves some kudos as they were one of the few big tech companies that objected to sharing their users’ details with the PRISM
The Bush administration threatened them with $250k a day fines until they complied. Verizon bought them in 2017. Yahoo suffered the largest data breach in history in 2018.
The link to this NYT story is not embedded (consider blocking the GTM tracker on the site)
TECHCRUNCH.com fingerprints the user’s device and dumps 2-7 Yahoo trackers in their browser, depending on the page loaded.
TECHCRUNCH.com has embed deals with 27 third parties, including Google, Facebook, Yahoo and WordPress.
15 of these are known tracking or advertising companies like Google, Facebook, Yahoo, WordPress, Atwola, Typekit, AOL and Scorecard Research.
TECHCRUNCH.com sets 4 short-term and 5 long-term cookies itself while allowing its third party partners (including 4 tracking companies) to set 1 short-term and 7 long-term cookies.
It uses Google Analytics but interestingly enables the anonymization feature so some user details are not sent to Google servers.
All servers are based in the US so forget about GDPR privacy rules.
THE REGISTER .co.uk
Although a great resource with well-written and groundbreaking stories, it isn’t as private as I’d hoped.
There is no obvious digital fingerprinting but it seems to have gathered more Google syndication in the last couple of years, (9 of its 16 embed deals are with the Big G). 12 known tracking or advertising companies like Google, Admedo and the Amp Project gather data.
THE REGISTER sets 3 short-term and 4 long-term cookies itself while allowing its third party partners (including 2 tracking companies) to set 7 long-term cookies.
It uses Google Analytics without enabling the anonymization feature so user details are sent to Google servers. Although THE REGISTER’s domain is in the UK, both its data and email servers are based in the US so GDPR privacy rules could be compromised here, though I am not a lawyer.
The Guardian .com
I’ve been sitting on this for a few years now but it’s about time I blew the whistle.
I first noticed the Guardian newspaper’s website was digitally fingerprinting its users’ devices when they published an article on, um, Canvas Fingerprinting.
That page has been removed since, but they still continued doing it, long before Facebook, though not before Google.
I’ve kept quiet about this surveillance because I admire the paper for its incredible journalism, especially exclusives like the Snowdon revelations, and its general championing of freedom issues across many sectors of society. But the hypocrisy has started to wear me down.
Some tracking items & widgets embedded on Guardian .com and captured by Ublock Origin
The Guardian has embed deals with a privacy-sapping 142 third parties, including Google, Amazon, Bing, Twitter, and, despite being one of its main critics, Facebook. 132 of these third party partners are known tracking or advertising companies like Google, Amazon, Facebook, Turn, AddThis, Scorecard Research, Blue Kai, Twitter Analytics, Rubicon, Criteo and Quantserve.
Some of the most aggressive trackers like GTM, AddThis and Turn are present here.
The Guardian also sets 3 short-term and 5 long-term cookies itself, while allowing its third party partners (including 51 tracking companies) to set 10 short-term and 131 long-term cookies.
Yes, we NEED the Guardian’s continued existence, but castigating Facebook et al while allowing them to track its users doesn’t sit well with me.
The website uses Google Analytics but at least enables the anonymization feature, so some user details are not sent to Google servers.
Although The Guardian’s data servers are in Germany, their email servers are based in the US so GDPR privacy rules could be compromised here, though, again, I am not a lawyer.
In conclusion, I’ve given just 5 examples of popular sites Federation users quote in their posts.
I am NOT advocating a boycott of these sites but politely suggest we don’t OEmbed them, just feature a hyperlink and give readers the heads-up about these privacy concerns.
Alternatively, look for other sources featuring the same story. It’s also worth highlighting which websites do NOT add a tracker when we OEmbed a story, or have a low level of surveillance. Please promote those guys.
#news #fakenews #journalism #FreePress #PressFreedom #theguardian
#privacy #tracking #trackers #facebook #social #mass-surveillance #gdpr #google #location #user #device #setup #private #secure #internet #tips #tricks #online #os #windows #apple #ios #advertising #ad #revenue #streams #developers #media #data #corporations #telemetry #consent #spyware #surveillancecapitalism #humanrights, #anonymity #cookies #surveillance #browser #proxy #relay #network #www #leaks #fingerprint #activity #activitytrackers #thefederation #pods #federation #fediverse #friendica #mastodon #pleroma #socialhome # #Gnusocial #Funkwhale #Peertube #pixelfed #hubzilla #Diaspora
How can Federation users post more safely?
You know how it goes. We find a great story online and we want to share it with our supporters or feature it in our feed with appropriate hashtags for maximum reach.
But do we check the website featuring the story for privacy before we post?
When we embed a link by selecting the OEmbed box (often ticked by default) this displays an image or video on our post from the website we’ve featured.
They may look cool, but these images can contain beacons or other trackers. Embedded trackers also load into the browsers of any user who scrolls down the public feeds.
Should we ensure the website is safe before linking to it?
Actually some do. Posts that don’t feature a website’s images (with the OEmbed box unchecked as below) can actually protect Federation users from a serious amount of surveillance.
Some thoughtful users actually reproduce the article’s main points in their post, to protect their readers from visiting the site itself. They usually supply a link to the original content if one wants more detail and perhaps is protected with tracker blockers. So how do we know a site we recommend is safe?
Here are some privacy tips:
• Consider checking the page’s security/privacy before linking to it.
Using Tor, or a beefed-up Firefox fork or version (for detecting digital fingerprinting), and/or Disconnect, NoScript or Ublock Origin add-ons to reveal a multitude of trackers.
• There is usually more than one website featuring the same story. Consider picking the website with the least trackers and digital fingerprinting.
• Issue a warning in your post about any of the site’s surveillance methods and privacy issues you’ve detected.
• Embedding a picture/video could also make users vulnerable. Consider unchecking the OEmbed box.
In the next post I’ll give examples of a number of websites with low privacy and excessive trackers, commonly featured in the public feeds.
#secure #internet #windows #apple #revenue #streams #developers #Social #media #data #corporations #tracking #trackers #facebook #social #mass-surveillance #gdpr #google #alphabet #location #user #device #setup #private #secure #internet #chrome #tips #tricks #online #os #mobile #ie #safari #apple #ios #ad #revenue #streams #developers #telemetry #consent #windows10 #windows7 #windows81 #microsoft #linux #debian #ubuntu #mate #gnome #grub #iphone #firefox #advertising #android #chrome #browser #browsers #phone #phones #device #Tor #privacy, #humanrights, #anonymity #internet #security #cookies #surveillance #browser #web #onion #router #torbrowser #bridge #proxy #relay #leaks #fingerprint #activity #activitytrackers #spyware #surveillancecapitalism
Millions of smartphone users confess their most intimate secrets to apps, including personal health information. Unbeknown to most people, in many cases that data is being shared with someone else:…
Article word count: 63
HN Discussion: https://news.ycombinator.com/item?id=19226480
Posted by mudil (karma: 5384)
Post stats: Points: 148 - Comments: 53 - 2019-02-22T16:12:59Z
#HackerNews #collects #data #developers #facebook #from #private #range #wide
Millions of smartphone users confess their most intimate secrets to apps, including when they want to work on their belly fat or the price of the house they checked out last weekend. Other apps know users’ body weight, blood pressure, menstrual cycles or pregnancy status.
Unbeknown to most people, in many cases that data is being shared with someone else: Facebook Inc.
HackerNewsBot debug: Calculated post rank: 116 - Loop: 308 - Rank min: 100 - Author rank: 57
Article word count: 1736
HN Discussion: https://news.ycombinator.com/item?id=19225873
Posted by turingbook (karma: 1331)
Post stats: Points: 141 - Comments: 78 - 2019-02-22T15:01:50Z
#HackerNews #developers #hate #how #make #other #with #work #you
We’ve all read those 10x developer articles (I wrote some – guilty as charged!). So if you want to know what you need to work on to improve…well, you have plenty of resources. But I have very seldom come across articles on what NOT to do or how NOT to behave as a developer. And actually, this may be the most important part of the equation!
So, long overdue, here is what I think is the top list of behaviors you should really work on fast, if you do any of them ;). Why? Well, you might not know it, but your co-workers might hate you for them, as you most likely negatively impact the whole productivity of the team – at the very least!
If you have one of these developers on your team, it might be worthwhile to share this article in your Slack team channel – just out of general interest, you know 😉!
I will try to prioritize the list from most to least impactful. The goal for me is to start the discussion on the list and prioritize it, too. So please comment.
That’s the first one, in my mind. You cannot work with a self-absorbed developer. I’ll even go so far as to say:
As long as you are willing to take responsibility for and learn from your mistakes, you’re not a bad developer. Click To Tweet
Arrogance makes you think that your code is perfect. You may even blame customers for being stupid and for crashing their program rather than reflect on why your software crashed. And that’s how you get:
But also messy, unreadable code for your teammates.
The problem with arrogance is that it is a behavior that will prevent you from improving. Stop being arrogant, or you’re just a lost cause.
Some of you may already know the Dunning-Kruger effect. We will mention this effect a few times in the list. Here is a graph explaining it:
The issue with arrogance is that 1) the developers don’t understand they are on top of the Peak of “Mt. Stupid,” and 2) they will stay there.
- Sloppiness in the Work Delivered
There are many ways developers can show sloppiness in the code they deliver. We all know at least one developer who:
* gives cryptic names for variables, or at best not self-explanatory
* puts typos in function names
* leaves old, outdated comments in the code
* shows a poor selection of data types and data structures
* doesn’t bother to run the code formatter, despite being told many times to do it
* ignores the IDE warnings
* copies and pastes StackOverflow code without understanding it or tweaking the solutions to fit their own code
* doesn’t take the time to document code (nobody wants to read the whole function or file to understand what it does)
* doesn’t handle errors properly
* uses excessive dependencies, and updates them without thinking
* doesn’t bother to understand the libraries or tools added to the code, potentially leaving glaring issues
* will always insist on following “best practices” without understanding why those practices are considered “best” (there is no such thing as best practices that adapt to every team)
Don’t be such a developer. They annoy the hell out of their colleagues. They slow the whole team’s development process down, requiring their teammates to spend unnecessary time on their code reviews. Their team will dread those code reviews, will grow impatient (we’re still humans), and bugs will get through the net.
The best way to solve this is for these developers to start to take pride in their work (not to be confused with the arrogance mentioned in point 1.
- Disrespect of Other People’s Time
The two thing developers hate most are interruptions and unnecessary meetings. That shouldn’t come as a surprise, as meetings are just scheduled interruptions. Developers can’t easily go back to where they were right before an interruption. They need to get into the mindset for development and then slowly trace back to where they left off. And every fellow developer knows that.
So, here are a few ways you can show disrespect to your colleague’s time and productivity:
* interrupting another developer who is clearly in the zone, for non-important stuff;
* constantly arriving late to meetings, which is a definite choice – whatever anyone says. Either the participants must wait for everyone to be there to start the meeting, or they start without the late developer. In the latter case, he or she will need to be brought up to speed at some point, hence some time lost, and arriving late will disrupt the flow of the meeting in any case;
* rambling on and on during meetings. Or, if there are non-coders in the audience, being unwilling to adapt to the audience and wasting time for the entire audience, as any point made will need to be explained again.
- Constant Negativity
Most developers are enthusiastic people, but sometimes you may have the chance (or misfortune) to work with a negative one. Negativity is infectious. If someone complains, it focuses the attention on the negative side of things.
They will criticize every choice made: the language, for instance, although, most of the time, those developers are clearly at the top of Mount Stupid (in the Dunning-Kruger Effect).
Don’t misunderstand me; there should be some criticism in the form of constructive opinions. For example, a Scala developer could talk to a Java developer about promises, saying, “Okay, your language is not as good as mine :P. But you could try CompletableFuture to have a taste of what a monad is. I will show you what you can do with that.” But unfortunately, that kind of friendly attitude is very rare these days.
I’m sure you have all seen a developer once in a while steal credit for the work produced by a team. This can be done through an email to management, a 1-on-1 talk or another sneaky non-straightforward way.
Developers value competence above all. Taking credit for someone else is taking the other’s competence for yourself and removing it from him or her. This is pretty high up on my list, as I feel it creates a lot of tension and distrust.
For greedy developers, such strategies might produce short-term visibility. But in the long run, they will be alienated. Other team members will evolve their communication to highlight their contributions better. After all, there are many ways to give credit.
- Disregard for The Team
Software engineering is done collaboratively with designers, product managers, and other developers. Respecting other people’s input and work is necessary if you don’t want them to go into Hulk mode and flip their desk. For instance:
* “How” documentation: many programmers comment on every single line of code without describing why it’s doing what it’s doing. If there were a bug in the program and you stumbled across this code, you wouldn’t know where to begin.
* Implementing an ugly or not-to-the-specs UI “because they’re not a designer”
* Not mentioning a UX problem to the product manager, because it’s not part of their job. Ignoring the big picture will make the software hard to use, expensive to maintain, and inconsistent with the other components.
* Not trying to understand how design or product decisions are made. And then continuing to ask the same irrelevant questions – and not improving.
* Not considering other team members’ priority dependencies and leaving them stuck in the mud.
* Using a new tool/library without warning any teammates. This can cause unforeseen issues down the line.
- Lack of Focus
Engineering teams solve problems. They use their technical abilities to build features/fix bugs to solve those problems. And some developers just forget about this and will:
* philosophize about technical topics instead of focusing on the problems
* argue obstinately about technical topics without considering the initial problem (although you do, of course, need to argue when building the solution to the problem)
* have lengthy discussions about those technical topics yet rely on their own opinions (instead of facts – facts solve problems, not opinions)
With code, sure, you can have several solutions to the same problem, but either it works or it doesn’t; there is no in-between. With focus, you can easily alleviate all uncertainties by trying out code in a sandbox, for instance. But lack of focus wastes the time and productivity of everyone involved.
- Lack of Accountability
As mentioned above, either the code works or it doesn’t…but it needs to work in combination with all the code being added to the codebase by your teammates. Software engineering is probably the most collaborative work in today’s world. Any code you write will interact with that of other developers.
So, for your team to work well, you need accountability. Sure, code reviews don’t let you get away with anything. But accountability is an attitude.
Unaccountable developers will, for instance, offer excuses instead of solutions. Those excuses may include time constraints or complexity of the tasks. Nobody wants to hear excuses; they want to understand the steps to be taken toward the solution. Excuses don’t invite others to help or provide a good picture of the task’s progress.
This is my list. Feel free to add more if you think of any, or to suggest a different order of importance.
The first thing you should know is that this means your manager is not doing their job. The issue should have been identified and the problematic developer(s) coached — if they were deemed coachable. The manager should have given warnings and made the hard decision if the bad developers were still impacting the team.
A team with a bad developer is way better off short one developer than it is with a bad element. Click To Tweet
A manager who doesn’t understand this is a manager who doesn’t understand software engineering. You have the case for a bad manager, but that’s for another article ;).
So what do you do? I would say this is a question to raise in your one-on-one with your manager, so they can address the issue. If your manager does nothing, you have several options: see if the developer can be coached, and take it upon yourself (and with the cooperation of other teammates), or change teams/companies. Hopefully, this article can help convince the said developer to be a better co-worker.
HackerNewsBot debug: Calculated post rank: 120 - Loop: 194 - Rank min: 100 - Author rank: 45
YC has built many resources that may be helpful for developers over the years. This page collects them in one place. Websites run by YC Blog posts and Essays Relevant YC Companies Articles and…
Article word count: 21
HN Discussion: https://news.ycombinator.com/item?id=19206396
Posted by TonnyGaric (karma: 334)
Post stats: Points: 110 - Comments: 29 - 2019-02-20T08:01:13Z
#HackerNews #combinator #developers #for #resources
YC has built many resources that may be helpful for developers over the years. This page collects them in one place.
* Websites run by YC * Blog posts and Essays * Relevant YC Companies
Articles and discussion for hackers
The Arc Programming Language, which Hacker News is written in
Work at a Startup
Jobs for developers at YC companies
Startup advice from YC distilled into one document
Blog posts and Essays
Ask a Female Engineer
A series of interviews with female engineers
Beating the Averages
A classic article on using powerful programming languages as a secret weapon
Better Bayesian Filtering
A proposal for a better bayesian filtering algorithm
How To Get Into Natural Language Processing
An introduction to NLP
Learning Math for Machine Learning
Mathematical background for learning Machine Learning
Data Packages for Fast, Reproducible Python Analysis
Advice on data packages from Quilt Data
Relevant YC Companies
Many YC companies are building developer tools. This is a list of them.
Manycore.io w2019 ManyCore.io speeds up computer programs by spreading them automatically onto several cores
PreFlight w2019 Code-Free Automated UI Testing.
Alpha Vantage s2018 We provide accessible & affordable APIs for financial market data
Anima App s2018 We convert design to code
Federacy s2018 Security testing and bug bounty platform.
Numericcal s2018 Easily deploy, optimize and manage Deep Learning modules on IoT and mobile devices.
RevenueCat s2018 RevenueCat is a simple API for managing in-app subscriptions.
CodeStream w2018 The knowledge base behind your codebase.
Haiku w2018 App builder that unifies design and code
Hexel w2018 Create a cryptocurrency for your community.
Jido Maps w2018 A lightweight API for persistent augmented reality.
NewCraft w2018 A marketplace for modern paid apprenticeships.
Repl.it w2018 In 2 seconds, boot up an online programming environment for your favorite language.
Sqreen w2018 Sqreen revolutionizes the way engineering teams protect their apps & customers against attacks.
AssemblyAI s2017 AssemblyAI builds customized speech-to-text models for customers working with voice data. Our customers use these models to transcribe phone calls, media, and other types of voice data with unparalleled accuracy and speed.
Escher Reality s2017 The backend for Augmented Reality.
Gopher s2017 Get things done without leaving your inbox.
Plasticity s2017 APIs that help developers create human-like natural language interfaces.
PullRequest s2017 Code review as a service - combining automation with a network of on-demand reviewers
Templarbit s2017 Protecting applications from malicious activity
Bitrise w2017 Hosted Continuous Integration and Delivery for mobile apps
FloydHub w2017 Floyd is Heroku for Machine Learning and Deep Learning. Run and deploy your project to the cloud with zero-setup.
Scaphold.io w2017 The Universal API
XIX.ai w2017 Next generation Image Intelligence platform for Defence, Intelligence and enterprise sectors.
DevColor s2016 We give Black software engineers the support they need to enter and advance in the tech industry.
Expo s2016 Expo brings together the best of web (development speed, fast iteration cycles, easy deploys, and automatic cross-platform support) and the performance and user experience of native apps. Letʼs talk if youʼre planning to build a mobile app.
MessageBird s2016 MessageBird is an API for sending Text, Voice & Chat messages. We offer the most advanced messaging API, packed with features and customizable parameters for high-volume and demanding message senders.
NuCypher s2016 The privacy layer of the decentralized web.
Opsolutely s2016 Automated deployments for software teams.
Scale s2016 Human-powered data for AI applications.
Wallarm s2016 Application and API security for the modern web
Women Who Code s2016 WWCode is a non profit with a set of programs that helps mid-career engineers get promoted.
Instabug w2016 In-app feedback and bug reporting for mobile apps. Weʼre helping apps squash bugs in their beta apps and engage users in their production apps. If youʼre building a mobile app, weʼd love to talk.
Appcanary s2015 Appcanary tracks the dependencies you use in your apps and servers and notifies you whenever youʼre vulnerable to security vulnerabilities.
Bitmovin s2015 Video Infrastructure for the Web
Convox s2015 Open-source tools for deploying, managing, and monitoring cloud infrastructure.
Font Awesome s2015 Font Awesome makes it easy to add vector icons and social logos to your website. And Pro gives 1,000+ more icons and SVG framework!
Gravitational s2015 Gravitational helps SaaS companies make more money by giving them a turn key "on-premise" offering for their enterprise customers.
Heroic Labs s2015 Social infrastructure for games and apps. Weʼve built Nakama server. An open-source distributed server for social and realtime games and apps.
SnapEDA s2015 The Internetʼs first parts library for circuit board design. Build circuit boards faster with millions of free symbols & footprints.
SourceDNA s2015 Bringing transparency to the app stores and helping developers build better apps. Acquired by Apple in 2016.
Zeplin s2015 Zeplin is a connected space for product teams where they can share designs, generate specs, assets and code snippets.
GitLab w2015 Git repository management, code reviews, issue tracking, issue boards, activity feeds, wikis and continuous integration. Community driven with more than 1000 contributors.
Moltin w2015 eCommerce building blocks through simple APIs for websites & apps. APIs include inventory, cart, checkout, payments and more.
Pachyderm w2015 Pachyderm is “Git for Data Science.” We offer complete version control for data and give your data science team the same first-class development tools as software developers.
Paperspace w2015 Paperspace is a GPU accelerated cloud platform for individuals, startups, and the enterprise.
ReadMe w2015 ReadMe provides every company the ability to quickly and easily create beautiful documentation, and build loyal and productive developer communities.
Sails Co. w2015 Full-service web, mobile, & cloud studio providing professional support for the Sails framework and the open-source tools we build and maintain.
Yhat w2015 End-to-end data science lifecycle management platform.
Blockstack s2014 Blockstack is a decentralized computing platform. It’s the easiest way to build decentralized apps that can scale.
Flynn s2014 Flynn is an open source Platform as a Service (PaaS)
Algolia w2014 With 50 data centers in 15 regions, Algolia offers a developer-friendly and enterprise-grade search API. Designed to make every search interaction meaningful and rewarding, Algolia serves billions of queries weekly for more than 5,000 customers.
Kimono Labs w2014 Create APIs where they donʼt exist. With kimono you can quickly extract unstructured data from websites and turn it into clean APIs to use in your applications and services.
Povio w2014 We build software for the best* startups in the world. We do it faster and cheaper than if they would have built it by themselves. Our speciality is that we can start right away. Search Bookface for testimonials from our clients. *YC
Taplytics w2014 Make product decisions driven by your customers: Taplytics is an intelligent customer experience cloud specializing in turning first-time users into lifetime customers through magical moments.
TrueVault w2014 TrueVault is the first data security company entirely focused on protecting consumersʼ Personal Data for enterprises
Two Tap w2014 Two Tap connects retailers to companies that want to sell their products, in apps or sites, domestic or internationally Two Tap Crossborder is risk-free for retailers and it allows anyone outside of the US to order products from 1000s of US stores
Wit.ai w2014 Natural Language for Developers -- Wit is an API that makes it easy for developers to create apps that you can talk and text to. It turns speech or text into actionable data.
Apptimize s2013 Apptimize lets mobile teams innovate faster to create an amazing user experience. Our tech lets you instantly update your native Android and iOS apps for A/B testing, feature flagging, and changes without having to go through the App/ Play Stores.
CoreOS s2013 Enterprise Linux distribution that dramatically improves security and speed of application deployment.
EasyPost s2013 Shipping API
Estimote s2013 Indoor location API for developers
Bitnami w2013 The App Store for Server Software
Etleap w2013 ETL for Big Data
Fivetran w2013 Data infrastructure as a service
Heap w2013 Heap automatically captures every user interaction in your mobile or web app, letting you generate analytics without writing code or waiting for data.
InfluxData w2013 InfluxData is building the platform for collecting, storing, visualizing, and processing time series data at scale.
Easel s2012 Easel is a visual design tool built for the web. Since the web is viewed in a browser, we believe it should be built in one too.
Pixate s2012 Mobile application prototyping. Now part of Google.
Rainforest s2012 Dead simple testing. The fastest, easiest way to test your website. Say no to manual QA!
Zapier s2012 Zapier connects hundreds of SaaS apps with customizable workflows via an easy to use editor.
Authy w2012 Authy is a Two-Factor Authentication platform for developers
Flutter w2012 Flutter combined computer vision technology with the built-in webcams in laptops, iPads, smartphones and TVs to let users control these devices with gestures, facial expressions, hints and body-language. Flutter became part of Google in Oct 2013.
Marft w2012 Marft creates embeddable machine learning models for application developers. Users submit data by web/API, and receive optimized models implemented in a language of their choice.
Per Vices w2012 Per Vices Corporation builds software-defined radio (SDR) products. Our Crimson platform provides the flexibility and bandwidth required to support various radio applications used within the infrastructure, defence, and telecommunications industries.
Citus Data s2011 Real-time. Big data. PostgreSQL
Clutch s2011 An easy to integrate library for native iOS applications designed to help you develop faster and deploy instantly.
Compose s2011 We make it easy to run databases. PostgreSQL, Redis, MongoDB, Elasticsearch, and RethinkDB.
Firebase s2011 App success made simple. An app platform to develop high-quality apps, grow your user base, and earn more money. Acquired by Google.
HackerRank s2011 Programmer IQ
OneSignal s2011 OneSignal provides a simple interface to push notifications. OneSignal lets content creators focus on quality user engagement instead of complex implementation. Our goal is to democratize push communication for everyone.
Parse s2011 Parse is the easiest way to build apps.
Realm s2011 Better data structures = no DB.
Stypi s2011 Realtime collaborative coding
AppHarbor w2011 .NET Cloud Platform as a Service
Mailgun w2011 Email API service.
MemSQL w2011 ANSI SQL-compliant, distributed, in-memory database for real-time analytics
Tumult w2011 Tumult is building the next generation of apps for web design. Our first app is Hype, the HTML5 animation builder for OS X: http://tumult.com/hype/
Upverter w2011 The future of hardware design. A marketplace for hardware engineering labour, component symbols, footprints, 3d models, access to manufacturing and enterprise grade ECAD for designing electronics, all rolled into one.
Docker s2010 App store for server configurations.
PagerDuty s2010 Notify you about server troubles.
Optimizely w2010 A/B testing.
Zencoder w2010 Video Encoding API, Open source video player (video.js)
Bump s2009 Bump, Flock, Photoroll (unreleased) => Google Photos
Stripe s2009 Payment processing
Directed Edge s2009 Product recommendations.
Cloudant s2008 NoSQL Database-aaS. Acquired by IBM in 2014. Now IBM Cloud Data Services
280 North w2008
HackerNewsBot debug: Calculated post rank: 83 - Loop: 251 - Rank min: 80 - Author rank: 56
Apple is telling app developers to remove or properly disclose their use of analytics code that allows them to record how a user interacts with their iPhone apps — or face removal from the app store,…
Article word count: 581
HN Discussion: https://news.ycombinator.com/item?id=19109027
Posted by jbegley (karma: 4398)
Post stats: Points: 126 - Comments: 68 - 2019-02-07T22:02:39Z
#HackerNews #app #apple #code #developers #disclose #recording #remove #screen #tells
Apple is telling app developers to remove or properly disclose their use of analytics code that allows them to record how a user interacts with their iPhone apps — or face removal from the app store, TechCrunch can confirm.
In an email, an Apple spokesperson said: “Protecting user privacy is paramount in the Apple ecosystem. Our App Store Review Guidelines require that apps request explicit user consent and provide a clear visual indication when recording, logging, or otherwise making a record of user activity.”
“We have notified the developers that are in violation of these strict privacy terms and guidelines, and will take immediate action if necessary,” the spokesperson added.
It follows an investigation by TechCrunch that revealed major companies, like Expedia, Hollister and Hotels.com, were using a third-party analytics tool to record every tap and swipe inside the app. We found that none of the apps we tested asked the user for permission, and none of the companies said in their privacy policies that they were recording a user’s app activity.
Even though sensitive data is supposed to be masked, some data — like passport numbers and credit card numbers — was leaking.
Glassbox is a cross-platform analytics tool that specializes in session replay technology. It allows companies to integrate its screen recording technology into their apps to replay how a user interacts with the apps. Glassbox says it provides the technology, among many reasons, to help reduce app error rates. But the company “doesn’t enforce its customers” to mention that they use Glassbox’s screen recording tools in their privacy policies.
But Apple expressly forbids apps that covertly collect data without a user’s permission.
TechCrunch began hearing on Thursday that app developers had already been notified that their apps had fallen afoul of Apple’s rules. One app developer was told by Apple to remove code that recorded app activities, citing the company’s app store guidelines.
“Your app uses analytics software to collect and send user or device data to a third party without the user’s consent. Apps must request explicit user consent and provide a clear visual indication when recording, logging, or otherwise making a record of user activity,” Apple said in the email.
Apple gave the developer less than a day to remove the code and resubmit their app or the app would be removed from the app store, the email said.
When asked if Glassbox was aware of the app store removals, a spokesperson for Glassbox said that “the communication with Apple is through our customers.”
Glassbox is also available to Android app developers. Google did not immediately comment if it would also ban the screen recording code. Google Play also expressly prohibits apps from secretly collecting device usage. “Apps must not hide or cloak tracking behavior or attempt to mislead users about such functionality,” the developer rules state. We’ll update if and when we hear back.
It’s the latest privacy debacle that has forced Apple to wade in to protect its customers after apps were caught misbehaving.
Last week, TechCrunch reported that Apple banned Facebook’s “research” app that the social media giant paid teenagers to collect all of their data.
It followed another investigation by TechCrunch that revealed Facebook misused its Apple-issued enterprise developer certificate to build and provide apps for consumers outside Apple’s App Store. Apple temporarily revoked Facebook’s enterprise developer certificate, knocking all of the company’s internal iOS apps offline for close to a day.
Many popular iPhone apps secretly record your screen without asking
HackerNewsBot debug: Calculated post rank: 106 - Loop: 54 - Rank min: 100 - Author rank: 208
What is your specialty/tech stack? How have you gotten around age discrimination? How do you suss out whether a company is right for you?
(I'm in my late twenties but I'm very curious to hear all your experiences.)
HN Discussion: https://news.ycombinator.com/item?id=19100129
Posted by kevintb (karma: 212)
Post stats: Points: 117 - Comments: 109 - 2019-02-06T21:23:47Z
#HackerNews #age #aged #around #ask #developers #discrimination #gotten #have #how #you
HackerNewsBot debug: Calculated post rank: 114 - Loop: 84 - Rank min: 100 - Author rank: 23
Dear web developers, First of all, thanks for taking time to set the background color for your web pages and form elements. The light grey or is so much more pleasant than the default glaring white…
Article word count: 211
HN Discussion: https://news.ycombinator.com/item?id=19055312
Posted by luuio (karma: 113)
Post stats: Points: 111 - Comments: 103 - 2019-02-01T16:11:35Z
\#HackerNews #color #dear #developers #font #set #the #too #web
Dear web developers,
First of all, thanks for taking time to set the background color for your web pages and form elements. The light grey or is so much more pleasant than the default glaring white color.
Though, that might be a problem for some users, especially those with a default dark theme on their systems. Let me demonstrate with some screenshots. Iʼll pick on Facebook first:
Facebook form on dark theme
What about the Dropbox login form?
Dropbox login form on dark theme
Google dictionary form on dark theme
Twitter 2FA form?
Twitter 2FA form on dark theme
You get the idea. The cases Iʼve shown here either set the background color without setting the text color, or vice versa.
I understand that this is like one of those accessiblity things, where it wouldnʼt matter to most of your traffic--and youʼve got much bigger fish to fry. Though hopefully this article would come up in your head the next time you type background-color or font-color in your CSS file. And if you have a few moments to spare, I propose one of thse three options:
\* Set the both the background color AND font color for your CSS selector, or \* Donʼt set the colors at all, let the browser use the system default color, or * Add yet another /* TODO */ in your codebase and call it a day. JK :-).
HackerNewsBot debug: Calculated post rank: 108 - Loop: 394 - Rank min: 100 - Author rank: 22
* * diaspod.de now 3 years old! * *
The server performance seems ok at the moment, so I've enabled registrations again (and also a paypal button ❤).
Da die Server Performance relativ ok ist, habe ich Registrierungen (und einen PayPal Button) wieder aktiviert (＾◡＾ )
Thanks to all #developers, who make this possible!
#diaspora #podserver #podmin #birthday #server #hosting #federation #fediverse
+ + diaspod.de now 3 years old! + +
The server performance seems ok at the moment, so I've enabled registrations again (and also a paypal button ❤).
Da die Server Performance aktuell ziemlich ok ist, habe ich wieder Registrierungen (und einen PayPal Button) aktiviert (＾◡＾ )
Thanks to all #developers, who make this possible!
#diaspora #podserver #podmin #birthday #server #hosting #federation
Turn off location. PART 2
Apart from Edge, which has to be tweaked from the W10 OS, most browsers can have their location services disabled through their menu. I cannot list EVERY browser in existence here, as I have a life. If you have other browser location tweaks, please share.
1. Click on Chrome’s menu and select the cog symbol – SETTINGS
2. Click the SHOW ADVANCED SETTINGS link at the bottom. Don’t be afraid of the ‘advanced’ implication, this has been worded to scare off timid sheep from reclaiming their privacy.
3. Click the CONTENT SETTINGS button under PRIVACY. While we’re here, consider unchecking the boxes urging us to use web services to ‘resolve navigational errors’ or ‘prediction services’ to auto complete our searches. This is just more telemetry.
4. Scroll down to the LOCATION section and select DO NOT ALLOW ANY SITE TO TRACK YOUR PHYSICAL LOCATION.
There are countless versions and forks of Firefox so, to save column inches, here are the about:config settings. Firefox (and especially Tor) should have location disabled.
To check, type about:config in the address bar and press enter.
• Press the button that says "I'll be careful, I promise!" or “I’ll take the risk!”
Type the terms in the search box and toggle to the following settings if you don't already have them:
geo.enabled = false → Disables the browser geolocation feature.
WITHOUT THE [SQUARE BRACKETS][geo].provider.ms-windows-location = false → Disables windows location.
geo.wifi.uri → Mozilla has used Google's geolocation service in Firefox by default for many years, so check for any Google addresses that may be here. This is an example of how Mozilla has lied about some of its user privacy claims – it seems to be posting our movements to the Big G. Erase any Google address and leave this field blank.
1. Click the TOOLS menu
2. Select INTERNET OPTIONS.
3. Click the PRIVACY tab at the top of the window
4. Check the NEVER ALLOW WEBSITES TO REQUEST YOUR PHYSICAL LOCATION box.
5. Click “OK” to save changes.
To disable Location in Safari, first click Safari > Preferences.
• Select the PRIVACY ‘hand’ icon at the top of the window.
• Under WEBSITE USE OF LOCATION SERVICES, select DENY WITHOUT PROMPTING to prevent all websites from asking to show your location.
Like the iOS, iPhone apps have to explain how they’ll use location data and must allow users to turn it off. Of course, access to this info is usually well hidden and when we find it it’s often written in brief, vague terms. To find LOCATION, do the following:
- Tap the SETTINGS icon, usually a cog or wheel
- Tap the PRIVACY icon, usually a white hand on a blue background
- Tap LOCATION SERVICES
• ALWAYS allow location (not recommended – it draws data even when it’s off)
• NEVER allow location
• Allow WHILE USING
The last one should be used for apps we think need to know our location or may be affected by disabling, although I’d venture there are few or none of these.
If you just want to block location on EVERYTHING just swipe that green switch in the pic above, to the left.
Always delete apps you never use. Limits spyware and saves battery.
Owned by Google, Android doesn’t stop snooping apps snuffle away location data, even when they’re turned off. It doesn’t even have the iPhone feature to turn off location when not using an app. After much criticism on this, on newer phones, the Big G reckons developers are only allowed to collect data “a few times an hour,” but if we don’t want ANY data collected, we have to do it from the phone’s main SETTINGS menu.
Older Androids are simpler to tweak
1. Open SETTINGS
2. Tap SECURITY and/or LOCATION
3. Uncheck ACCESS TO MY LOCATION box
4. Swipe GPS SATELLITES button to OFF
Like the iPhone, newer Android phones show a list of individual apps and allow us to turn off each app’s location button. Otherwise we can switch all location snoops off with the main button in APP LEVEL PERMISSIONS.
WIPE THE DATA GOOGLE HAVE COLLECTED
To be fair to Google, who collect data like bees collect pollen, they do have a portal where we can remove our location data (and more).
I am not sure if we can access all the data Google collects about us, or our device, if we DON’T have an account with one of their services, (#Gmail, Google Docs, #YouTube, Android, Google Drive, G+, etc) but it’s worth going through the data they’ve collected "to improve our advertising experience".
Obviously, we will be tracked within an inch of our life at Google central, but will have to suck it up if we want to clear our data. Be prepared for eyes to water and flabbers to be gasted.
#privacy #tracking #trackers #facebook #social #patent #mass-surveillance #surveillance #gdpr #google #alphabet #location #user #what3words #device #setup #private #secure #internet #chrome #tips #tricks #online #os #windows #mobile #ie #safari #apple #ios #ad #revenue #streams #developers #Social #media #data #corporations #telemetry #consent #windows10 #windows7 #windows81 #microsoft #linux #debian #ubuntu #mate #gnome #grub #iphone #firefox #advertising #android #chrome #browser #browsers #phone #phones #device
A lot of game developers say they want to unionize -- but will they?
Article word count: 679
HN Discussion: https://news.ycombinator.com/item?id=18991086
Posted by toufiqbarhamov (karma: 2066)
Post stats: Points: 105 - Comments: 106 - 2019-01-24T17:58:47Z
\#HackerNews #developers #game #half #nearly #unionize #want
MoviePass is planning to relaunch an unlimited movie plan
SoundCloud is losing its second and final co-founder
Tech companies spent more than $64 million on lobbying in 2018
Nearly half of game developers want to unionize
Jaguar tests self-driving cars that project their next move
Blue Originʼs latest New Shepard test flight hauled NASA experiments
The Polestar 2ʼs infotainment system is powered by Google
— Game Workers Unite UK (@GWU_UK) December 14, 2018
With all of this conversation swirling around studio life, the folks behind the Game Developers Conference added new questions to the seventh annual State of the Industry Survey, which included responses from nearly 4,000 developers. The questions were broad: should the games industry unionize, and will the games industry unionize? Forty-seven percent of respondents said yes, game developers should unionize, while 16 percent said no and 26 percent said maybe.
However, developers werenʼt exactly hopeful about unionization efforts. Just 21 percent of respondents said they thought the industry would unionize, and 39 percent said maybe. Twenty-four percent said it simply wasnʼt going to happen. One developer added the following thought: "There is too much supply: too many people want into the industry. Those who unionize will be shoved out of the way as companies hire those with fewer demands."
The survey found 44 percent of developers (from hobbyists to AAA) worked more than 40 hours per week on average. It also included a question about the maximum number of hours developers had worked in a single week over the past year. Just over 1 percent said they worked more than 110 hours in a week, while 6 percent reported working 76 to 80 hours, "suggesting that deadline-related crunch can go far beyond normal working hours," according to the survey.
Epic Games Store
GDC executive vice president Simon Carless told Engadget the survey team added the unionization questions because developers were asking for them.
"Since this is the first time weʼve started asking about the support for unionization among developers, we canʼt say for sure what the trajectory of support may or may not be," Carless said. "But we have seen a keen interest in discussing unionization from the game developer community. This is reflected in the fact that we now have a number of sessions that will be addressing the topic."
GDC 2019 kicks off on March 18th and Game Workers Unite will be there, alongside labor union organizers from other industries, starting conversations and getting folks involved.
"We have seen a keen interest in discussing unionization from the game developer community."
This yearʼs State of the Industry Survey collected a handful of other new statistics, including some dedicated to Steam and its fresh competition. The Epic Games Store went live in December, offering developers a revenue share of 88 percent, compared with Steamʼs long-standing offer of 70 percent. The new Discord store joined the party a few days later, promising developers 90 percent of all revenue generated by their game sales.
Steam has dominated the digital distribution market for roughly a decade, setting standards and making plenty of developersʼ dreams come true. However, Steam has become crowded, and the market is ripe for innovation and competition. Unsurprisingly, 47 percent of GDC survey respondents said they sold their games on Steam. Of those developers, 54 percent said Steam accounted for at least three-quarters of their total sales revenue; other storefronts generated less than 10 percent of overall revenue for most developers.
Hereʼs the juicy bit: The 2019 GDC survey also asked developers whether Steamʼs 30 percent cut was justified. Just 6 percent of respondents said yes. Roughly one-third of respondents said Steamʼs revenue-sharing model didnʼt make sense, 27 percent said it probably didnʼt, and 17 percent said they werenʼt sure.
One respondent offered the following advice for Steam: "Take less revenue from sales and curate their store better for visibility for real games."
In this article: av, business, discord, epicgamesstore, GameDevelopment, gaming, gdc, indie, personal computing, personalcomputing, steam, survey, tomorrow, union
[IMG]By Jessica Conditt @JessConditt
Jessica earned her BA in journalism from ASUʼs Walter Cronkite School in 2011, and sheʼs written for online outlets since 2008, with four years as senior reporter at Joystiq. She specializes in covering independent video games and esports, and she strives to tell human stories within the broader tech industry. Jessica is also a sci-fi novelist with a completed manuscript floating through the mysterious ether of potential publishers.
Yamahaʼs Sonogenic keytar is equal parts instrument and party trick
Amazonʼs all-female NFL commentary team will return next season
Andrea Kremer and Hannah Storm will again call ‘Thursday Night Football’ games.
HackerNewsBot debug: Calculated post rank: 105 - Loop: 80 - Rank min: 100 - Author rank: 58
Is there anyone of you at the Chaos Communication Congress in Leipzig this year right after Christmas? Is there anyone interested to have a meeting there?
Just some exchange, we would need some people to moderate the event, but basically some meetup to exchange information and get to know other players in the field.
"Someone" could then register a "talk" or "meetup" for the upcoming congress, I'd say a duration of about 1.5 to 2 hours and maybe 60+ people can be expected, assuming there is many #webmasters or #developers among the visitors at the #35C3.
Any #devs and #webmaster of the following systems, or any that I might have missed that are using #ActivityPup and can communicate with the others, please comment here if you like the idea!
#Friendica #Diaspora #red #Hubzilla #GnuSocial #StatusNet #Mastodon #Pleroma #Socialhome #Ganggo
Let me know if you have any questions.