.advertise@offshoreoiljobs.co.uk

.www.offshoreoiljobs.co.uk

Category: Telecommunications Engineering

Three Years Later – Several People Are Coding

We’ve reached a few big milestones for the Slack Bug Bounty program: it’s our three-year anniversary, and we’ve paid out more than $210,000 in bounties! We want to give a big thank you to all the security researchers who have helped make Slack more secure. In this post we’ll offer a retrospective on our bug bounty program, discuss lessons learned, and offer guidance for researchers. We also hope this information will be useful for anyone else running a bug bounty…

An Intro) – Zenefits Engineering

This is the first in a series of posts exploring Bug Bounty Programs (BBPs) in general, and the Program created and managed by Zenefits’ Security Team specifically. Two years ago, the Zenefits security team made the decision to start a private bug bounty program. The purpose was simple: invite the security community to test our products and help us identify weak areas. As the head of our internal Red Team, I inherited the program when I joined in June of…

Can Anything Echo Hears Be Used Against You In a Court of Law?

That’s the question raised by a murder case out of Bentonville, Arkansas.  On Saturday, Nov. 21, 2015, James Bates invited three friends over to watch an Arkansas Razorbacks game.  The men had some drinks, and when one of them, Owen McDonald, left around 12:30 AM, Bates was still up and around.  The next morning, Bates called 911 to report that he’d found one of his guests, Victor Collins, floating face-down, dead in Bates’s hot tub.  He claimed he’d gone to…

Be our design/code/??? intern for summer 2017!

By David Eads | February 14, 2017 Map by Visuals Team intern Brittany Mayes Are you data-curious, internet savvy, and interested in journalism? Do you draw, design, or write code? We are looking for you. We’ve had journalists who are learning to code, programmers who are learning about journalism, designers who love data graphics, designers who love UX, reporters who love data, and illustrators who make beautiful things. Does this sound like you? Please join our team! It…

Introducing Tripod: Flickr’s Backend, Refactored

By Peter Welch, Senior Principal Engineer Today, Yahoo Mail introduced a feature that allows you to automatically sync your mobile photos to Yahoo Mail so that they’re readily available when you’re composing an email from your computer. A key technology behind this feature is a new photo and video platform called “Tripod,” which was born out of the innovations and capabilities of Flickr. For 13 years, Flickr has served as one of the world’s largest photo-sharing communities and as a…

Part 2 – Several People Are Coding

This is a continuation of Part 1, covering some highlights and lessons learned from a refactor of the way the Slack desktop client fetches messages. In particular: architecture lessons learned in hindsight, regressions found while refactoring, the pitfalls of over-aggressive caching, and the downsides of LocalStorage and client-side compression. Lessons Learned From Refactoring In hindsight, “metadata” API methods like users.counts, which lets us render the channel list state without having to fetch messages for every channel, would have been great…

How Etsy Manages HTTPS and SSL Certificates for Custom Domains on Pattern

In April of 2016 Etsy launched Pattern, a new product that gives Etsy sellers the ability to create their own hosted e-commerce website. With an easy-setup experience, modern and stylish themes, and guest checkout, sellers can merchandise and manage their brand identity outside of the Etsy.com retail marketplace while leveraging all of Etsy’s e-commerce tools. The ability to point a custom domain to a Pattern site is an especially popular feature; many Pattern sites use their own domain name, either…

Tricks A Dumb Grid Can Play

Inauguration Day in Brookville, Pennsylvania arrived with a bang. Within minutes after Donald Trump swore to preserve, protect, and defend the constitution of the United States, the 911 calls began.  In one house, light bulbs were exploding.  Another resident reported that a power strip was smoking.  At another house, the siding was on fire, and at yet another the electric meter was engulfed in flames.  The main radio transmitter at the police station tripped out, so the 911 call center…

What Are the Rules of Cyberwarfare?

We are now well into the era of cyberwarfare—the use of computers and computer networks in military, terrorist, and diplomatic conflicts.  But to judge by the recent tiff between President Obama and Russian President Vladimir Putin, neither the U. S. nor Russia has figured out exactly how to use these new weapons, or how to defend against them effectively. Last July, Wikileaks unleashed a flood of embarrassing emails hacked from the Democratic National Committee, leading to the resignation of that…

3 Takeaways from IoPP’s Packaging Machinery Course

I recently completed the IOPP Packaging Machinery Basics course at Frain Industries in Chicago, a “survey course” that introduced attendees to a wide range of types of packaging machinery. The course is designed for engineers who work on the design side of packaging, as many packaging professionals have minimal experience working with packaging machinery. This is in large part due to machinery is marginally covered or not taught in many packaging engineer degree programs. Three Course Highlights/TakeawaysNow that I’m a…