{"id":25502,"date":"2022-03-19T18:13:39","date_gmt":"2022-03-20T01:13:39","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=25502"},"modified":"2022-03-19T18:13:39","modified_gmt":"2022-03-20T01:13:39","slug":"ccatp-719","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2022\/03\/ccatp-719\/","title":{"rendered":"CCATP #719 \u2013\u00a0Bart Busschots on PBS Tidbits 3 of Y"},"content":{"rendered":"<p>In this Programming By Stealth adjacent installment labeled Tidbits 3 of Y, Bart Busschots talks to us about the dangers of using other people&#8217;s code in your code, and the danger of not using other people&#8217;s code.  He explains this seeming dichotomy and gives us ways to approach the problem taking a middle ground. He helps us think about how to choose whether to use other&#8217;s code and whose code to use, and even how to ensure it&#8217;s kept up to date with security patches.  It&#8217;s definitely a philosophical installment and it was triggered by a recent event where a developer maliciously broke his own code, impacting a lot of developers. It&#8217;s actually sort of a success story of open source which I didn&#8217;t expect.<\/p>\n<p>You can find Bart&#8217;s fabulous tutorial shownotes at <a href=\"https:\/\/pbs.bartificer.net\/tidbit3\">pbs.bartificer.net<\/a>.<\/p>\n<audio class=\"wp-audio-shortcode\" id=\"audio-25502-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/CCATP_2022_03_19.mp3?_=1\" \/><a href=\"https:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/CCATP_2022_03_19.mp3\">https:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/CCATP_2022_03_19.mp3<\/a><\/audio>\n<p><a title=\"mp3 download\" href=\"https:\/\/media.blubrry.com\/nosillacast\/traffic.libsyn.com\/nosillacast\/CCATP_2022_03_19.mp3\" target=\"_blank\" rel=\"noopener noreferrer\">mp3 download<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this Programming By Stealth adjacent installment labeled Tidbits 3 of Y, Bart Busschots talks to us about the dangers of using other people&#8217;s code in your code, and the danger of not using other people&#8217;s code. He explains this seeming dichotomy and gives us ways to approach the problem taking a middle ground. He [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18994,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,1,213],"tags":[3483,5107,5008,1899,2799,50],"class_list":["post-25502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-podcasts","category-programming-by-stealth","tag-github","tag-libraries","tag-npm","tag-open-source","tag-reuse","tag-security"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2019\/08\/PBS_Logo-1-300x300_no_alpha.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/25502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=25502"}],"version-history":[{"count":1,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/25502\/revisions"}],"predecessor-version":[{"id":25503,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/25502\/revisions\/25503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/18994"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=25502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=25502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=25502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}