This account is a replica from Hacker News. Its author can't see your replies. If you find this service useful, please consider supporting us via our Patreon.
| Official | https:// |
| Support this service | https://www.patreon.com/birddotmakeup |
| Official | https:// |
| Support this service | https://www.patreon.com/birddotmakeup |
Software engineering is not “coding” though.
Before AI for the last 8 or so years now first at a startup then working in consulting mostly with companies new to AWS or they wanted a new implementation, it’s been:
1. Gather requirements
2. Do the design
3. Present the design and get approval and make sure I didn’t miss anything
4. Do the infrastructure as code to create the architecture and the deployment pipeline
5. Design the schema and write the code
6. Take it through UAT and often go back to #4 or #5
7. Move it into production
8. Monitoring and maintenance.
#4 and #5 can be done easily with AI for most run of the mill enterprise SaaS implementations especially if you have the luxury of starting from the ground up “post AI”. This is something you could farm off to mid level ticket takers
There is no money in mobile apps. It came out in the Epic Trial that 90% of App Store revenue comes from in app purchases for pay to win games. Most of the other money companies are making from mobile are front end for services.
If someone did make a mobile app, how would it get up take? Coding has never been the hard part about a successful software product.
Yes because other operating systems never have a decade old vulnerability?
https://www.sysdig.com/blog/detecting-cve-2024-1086-the-deca...
And yes because their UI folks should be spending time on the kernel. What next? If Apple didn’t have so many people working at the Genius Bar they could use some of those people to fix security vulnerabilities?

Discover how attackers are actively exploiting CVE-2024-1086, a decade-old Linux kernel netfilter vulnerability now used in ransomware campaigns. Learn how this privilege-escalation flaw works, why it endangers Linux systems, and how Sysdig helps detect exploitation and defend your infrastructure.