Bram Geron's Avatar

Bram Geron

@bram.xyz.bsky.social

Rust, product. He/they. Nushell&jujutsu fanboi. Live in 🐻 Berlin Used to do research on programming languages. @bgeron on other networks. Standing with πŸ‡΅πŸ‡Έ is standing with human rights.

103 Followers  |  204 Following  |  470 Posts  |  Joined: 11.11.2023  |  2.1705

Latest posts by bram.xyz on Bluesky

I would put more weight on these internal factors than on influence. Especially in an employer’s hiring market. Though I don’t know the importance of influence for attracting staff+ employees

04.08.2025 10:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

The external post can also be useful docs for coworkers and future employees. External posts warrant more time investment to make them good than internal docs do. And it can help change team culture to work more in the open and invite feedback, rather than isolated from other teams / your peers

04.08.2025 10:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

From the creator of UML 1.0: β€œThere’s a sweet spot for a tremendous amount of software engineering that does not need the UML”

02.08.2025 17:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

41:00 "Bill Gates said 'Grady, I'm stepping down and I'd like you to take the role of Chief Architect'. I did some research, and came back, 'Bill, I'm flattered, but you have a profoundly dysfunctional company, and I'm not the one to fix it."

pca.st/w2a6ta7h?t=41m

02.08.2025 17:08 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

MCP is a headless scripting language (bring your own syntax)

02.08.2025 11:23 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Not to mean they’re wrong, but I think they misjudged their audience β€” it was hard for me with 5 years of πŸ‡³πŸ‡± high school chemistry.

02.08.2025 09:51 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

And -OH is what turns alkanes into alcohols. It’s -OOH for carboxylic acids 🀷🏼 I guess one O was in the Ac

02.08.2025 09:50 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

But then Nebula’s payouts can’t add up to much either with 50% of €3 going to creators…

02.08.2025 09:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

YouTube Premium makes it a bug-ridden product instead of a super annoying bug-ridden product 🀷🏼

And I have this nagging feeling that creators get very little of my €13/month, instead it goes mostly to music labels (I don’t use it for music). I resent that idea

02.08.2025 09:16 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Someone should compare the environmental cost of letters to receiving GMail when Gemini is active

01.08.2025 23:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Favorite jj alias: jj swap β€” swap the last two commits

Define with:

swap = ["rebase", "-r", "@-", "-B", "@--"]

01.08.2025 09:29 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

…and today the blocklist feeds again

I’m sorry you have to go through this πŸ˜”

01.08.2025 06:07 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

This is a good talk.

31.07.2025 10:26 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

The politics in question: β€œpeople deserve to live and not to starve”

31.07.2025 07:27 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Data Is the New Uranium: Dangerous and Hard to Secure | Eberhard Wolff Software developers and software architects must handle data with great care. Otherwise, they create risks no one can fully assess.

Data is the new uranium: dangerous and hard to secure

VW leaked car location data β€” but the real issue is that we store so much data.

If you build software, read this.

πŸ‘‰ ewolff.com/2025/07/3...

30.07.2025 08:52 β€” πŸ‘ 8    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

And interesting thoughts about Google vs Amazon’s DNA in the full episode

30.07.2025 09:51 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

β€œJust sing out a Te Deum / when you see that ICBM” is one of my favourite rhymes of all time

R.I.P. Tom Lehrer

27.07.2025 20:55 β€” πŸ‘ 55    πŸ” 3    πŸ’¬ 2    πŸ“Œ 0

I know very little about personal branding but β€œtypically humble, proactive, and helpful, without much concern for personal gain” seems like a personal brand to me, and I’m glad that your org supports that

28.07.2025 22:11 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Maybe it’s contrasting to hypothetical CISOs who care about ass-covering and ticking boxes at any cost to the org? And who don’t really care about being helpful

(Just speculating, not speaking from any experience)

28.07.2025 22:08 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

On the cultural price of distributed teams

24.07.2025 04:05 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

For sure, moddable keyboard have a tendency to be a time sink.

23.07.2025 03:31 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Episode 470: I said something stupid in a meeting and just want to code It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software dev...

β€œContractors are the cloud of people β€” they’re quick to spin up and spin down”

22.07.2025 17:07 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I need this on my 60% UHK60, but I also get value out of it. It means you can have a 2-key chord for rarer actions like media control, LockScreen, Suspend, mouse.

22.07.2025 12:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I guess it’s a bit late, but did you consider a layer modifier button to hide rarer keys behind?

22.07.2025 12:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0

I also see "blocked post". Maybe they set the thread to mutuals only, or so?

20.07.2025 22:39 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I let a goat from my local zoo run SQL commands against prod without protection and it nuked my data

The comments: have you tried this other much smarter goat

20.07.2025 16:32 β€” πŸ‘ 759    πŸ” 157    πŸ’¬ 12    πŸ“Œ 5
Screenshot of article text: β€œFormal verification today is very useful, but for most systems it’s very difficult to write the kinds of complete specifications that verification needs. However, other kinds of specifications are popular: for example, a test case is a kind of limited, partial specification. The key is that a test case is immediately useful, and doesn’t impose undue costs on the development team. We need to find ways to specify systems that have these virtues, and avoid the trap of imposing a complete and coherent view that fundamentally does not exist.”

Screenshot of article text: β€œFormal verification today is very useful, but for most systems it’s very difficult to write the kinds of complete specifications that verification needs. However, other kinds of specifications are popular: for example, a test case is a kind of limited, partial specification. The key is that a test case is immediately useful, and doesn’t impose undue costs on the development team. We need to find ways to specify systems that have these virtues, and avoid the trap of imposing a complete and coherent view that fundamentally does not exist.”

Screenshot of article text: β€œ I’ve come to think writing formal specifications is just a very difficult task. It requires a top-down view of the system that designers and engineers typically don’t have or, more importantly, need. In contrast, informal specifications can be ambiguous, partial, flexible. Informal specifications are intended as communication mechanisms between humans, and as a result they can be β€˜wrong but useful’, and elide aspects of the system that are not of interest. This is a strength, but it also results in systems that can’t be easily formalized.”

Screenshot of article text: β€œ I’ve come to think writing formal specifications is just a very difficult task. It requires a top-down view of the system that designers and engineers typically don’t have or, more importantly, need. In contrast, informal specifications can be ambiguous, partial, flexible. Informal specifications are intended as communication mechanisms between humans, and as a result they can be β€˜wrong but useful’, and elide aspects of the system that are not of interest. This is a strength, but it also results in systems that can’t be easily formalized.”

Screenshot of article text: β€œ I think systems are typically both designed from the top and grown incrementally. Most systems have some degree of top-down structure, but few systems have a mathematically coherent specification that covers every behavior. The effect is that most systems obey some formal specification for some core functionality, but if outside this core, we rapidly enter muddy territory where it is unclear what the system should do, or whether the designer should even care”

Screenshot of article text: β€œ I think systems are typically both designed from the top and grown incrementally. Most systems have some degree of top-down structure, but few systems have a mathematically coherent specification that covers every behavior. The effect is that most systems obey some formal specification for some core functionality, but if outside this core, we rapidly enter muddy territory where it is unclear what the system should do, or whether the designer should even care”

Screenshot of article text: β€œ It’s a formal verification clichΓ© that writing the specification tends to uncover most of the bugs in a system. To me, this suggests an analogy between specification and programmingβ€”both are tools for expressing what we want. In one way, this is a pessimistic thought: no tool can remove the burden of clarifying our ideas. But also, it gives me some hope. Programming is very difficult, but through careful tool design, we’ve made it available to hundreds of millions of people. With luck and skill, perhaps we can do the same for specifications.”

Screenshot of article text: β€œ It’s a formal verification clichΓ© that writing the specification tends to uncover most of the bugs in a system. To me, this suggests an analogy between specification and programmingβ€”both are tools for expressing what we want. In one way, this is a pessimistic thought: no tool can remove the burden of clarifying our ideas. But also, it gives me some hope. Programming is very difficult, but through careful tool design, we’ve made it available to hundreds of millions of people. With luck and skill, perhaps we can do the same for specifications.”

New Galois blog: β€œSpecifications Don’t Exist”. If we want to formally verify more systems, we need formal specifications, but most real systems are hard to specify for very deep reasons www.galois.com/articles/spe...

16.07.2025 00:48 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

AI is now significantly weakening Internet security by burdening maintainers

(It may be helpful in other regards, or harmful in more ways than this)

14.07.2025 11:28 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Drive(way) is for being stationary, probably your need Google Park(way)

13.07.2025 18:25 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Header text: "HEY YOU! YES YOU! TAKE THIS SHIT OUT OF LINKS!"

This is followed by a couple example urls, with a red square highlighting the sections with source identifiers. The rest of the text is as follows: 

Source identifiers are used to track your activity on a site. Where you came from, what device you use, and even who you talk to. Whether it's written clearly in the url or tied to a random string of characters, it's assigned to your activity. 
 
When you send a link containing a source identifier to somebody and they click it, it signals to the website that you two are connected. And that data goes right back to the website operators, and thus their advertisers. 
 
Whenever you select "share" or "copy link" on a social app or website, it creates a link like this. If you give even the smallest shit about online privacy, it's important to remove them. Everything after the "?" symbol can be removed without issue, especially sections starting with "si=" or "utm_source="

Header text: "HEY YOU! YES YOU! TAKE THIS SHIT OUT OF LINKS!" This is followed by a couple example urls, with a red square highlighting the sections with source identifiers. The rest of the text is as follows: Source identifiers are used to track your activity on a site. Where you came from, what device you use, and even who you talk to. Whether it's written clearly in the url or tied to a random string of characters, it's assigned to your activity. When you send a link containing a source identifier to somebody and they click it, it signals to the website that you two are connected. And that data goes right back to the website operators, and thus their advertisers. Whenever you select "share" or "copy link" on a social app or website, it creates a link like this. If you give even the smallest shit about online privacy, it's important to remove them. Everything after the "?" symbol can be removed without issue, especially sections starting with "si=" or "utm_source="

I saw an infographic a couple years ago about how to remove source identifiers from links and why it's important, but I can't find it again and too many people I know are sending me links with them so here's an infographic straight from the oven

11.07.2025 22:22 β€” πŸ‘ 12206    πŸ” 7124    πŸ’¬ 182    πŸ“Œ 295

@bram.xyz is following 20 prominent accounts