0 Followers
0 Following
3 Posts
(Note: historically accurate "about" from early 2009. Preserved for lulz…)

Mobile, mobile web, business analysis, rapid web/mobile prototyping. Tech Director (according to my business cards).

But _really_ microcontroller toy/art projects (Arduino/RaspberryPi), radio and/or computer controlled flying things (slope soarers, gliders, electric drones, and quadcopters), motorcycles (a Ducati Monster and a Honda Spada), and coffee (mostly espresso, not such a big fan of pourover/syphon/aeropress).

From Sydney, Australia.

twitter: @iain_chalmers | [email protected]

(GPG fingerprint: F1DE F002 29F0 9955 F1E6 141D 9E2C BE9E 4322 63ED)
This account is a replica from Hacker News. Its author can't see your replies. If you find this service useful, please consider supporting us via our Patreon.

Officialhttps://
Support this servicehttps://www.patreon.com/birddotmakeup

> I don't think "slingshot" is the right analogy here.

I think it's perfect - a very valid "David vs Goliath" reference.

Stock dark pattern verbiage...

I'm a little surprised the options aren't "Enable" and "Ask me later".

"From time to time I get security reports about Redis. It’s good to get reports, but it’s odd that what I get is usually about things like Lua sandbox escaping, insecure temporary file creation, and similar issues, in a software which is designed (as we explain in our security page here http://redis.io/topics/security) to be totally insecure if exposed to the outside world." -- antirez, 4 Nov 2015, https://antirez.com/news/96
Redis security

Security model and features in Redis

Docs