Instagram scaled from 0 to 14 million users in just over a year, from October 2010 to December 2011. They did this with only 3 engineers.
They did this by following 3 key principles and having a reliable tech stack.
Hey! You! Yes, you! Looking for a senior hacker role? Want to work for the second biggest creator of comics called DC¹? Fancy working in a team and environment that, in my experience, is the nicest group of folk I’ve worked with in the 35 years I’ve been banging on keyboards for money? Think you could cope working with me? (Okay, fine, forget that last part).
Perhaps know someone who might like that?
1: I think. Honestly, I’ve not actually fact-checked that.
"In a fantasy tech startup, who would you hire?
For me it would be @davepdotorg and @mathsppblog
But it's no fantasy. Dave and Rodrigo will be starting at Textualize. They will be helping me build Textual. The TUI framework for #Python that will eat some of the browser's lunch."
As per the title: a retrospective of requests.
Possibly killer quote: "After receiving our first security disclosure, I was told that Requests wasn't a serious project but instead one person's art project and thus we shouldn't fix the vulnerability. This was despite the project being touted as being used by multiple international government agencies, political campaigns, and boasting about it's #1 download spot on PyPI. So when I say it might be artful, I'm trying to take a neutral stance on what is art and what isn't art and whether the internals of Requests are actually beautiful art."
An implementation of Emacs Lisp's defadvice
, for Python.
Sadly thr library itself is very old (14 years old at the time of recording this), and only for Python 2. There is, however, a PR in the repo that makes it work with Python 3.
"Four months ago, Adnan Khan and I exploited a critical CI/CD vulnerability in PyTorch, one of the world’s leading ML platforms. Used by titans like Google, Meta, Boeing, and Lockheed Martin, PyTorch is a major target for hackers and nation-states alike.
Thankfully, we exploited this vulnerability before the bad guys.
Here is how we did it."