Same for me. Many times I would have an idea, but I would think ahead of all the mundane and tedious things I would need to complete to implement it and not even get started. Now I work with the LLM to do those more tedious and mechanical parts and frankly the LLM is generating pretty similar code to what I would have written anyway and if not I just rewrite it. A few times I've even been pleasantly surprised when the LLM took an approach I wouldn't have considered and I actually liked it better.
Personally I didn't care about shims or performance. I find the asdf commands to be difficult to remember because they are unintuitive. See the "UX" section of the link above.
you can't use latest:20 in a .tool-versions file or many other places
This has always bugged me in asdf where I just want to say something like python:3.11.* where I don't care about the patch version number just that some 3.11 version is used.
Obsidian Security | Principal Backend Engineer | Philadelphia, Newport Beach, Palo Alto | REMOTE | Full-Time
Obsidian Security is at the forefront of SaaS security, dedicated to detecting and mitigating threats effectively.
With our advanced threat detection solution, we visualize user activity, identify employee compromise, and mitigate insider threats, ensuring data security before a material breach occurs.
Skills:
- Python (specifically experience with asyncio)
- SQL
- Rust a plus
- SQLAlchemy
- Fastapi
- Scylla DB a plus
- Go
Obsidian Security | Threat Backend Engineer | Newport Beach, Palo Alto, Philadelphia | Onsite or Remote | Full-Time
Obsidian Security is at the forefront of SaaS security, dedicated to detecting and mitigating threats effectively.
We are hiring for multiple roles.
Threat Detection Team:
With our advanced threat detection solution, we visualize user activity, identify employee compromise, and mitigate insider threats, ensuring data security before a material breach occurs.
Skills:
- Python (specifically experience with asyncio)
- Rust a plus
- SqlAlchemy
- Fastapi
- Scylla DB a plus
- Go
The only time I've ever experienced a memorable amount of pain was when I was working on a project that used one of the newer options like Poetry. Using a virtualenv, a requirements.txt file, and pip I have not had serious issues in 15 years of using Python.
Obsidian Security | Threat Team Engineer | Newport Beach, Palo Alto, Philadelphia | Onsite or Remote | Full-Time
Obsidian Security is at the forefront of SaaS security, dedicated to detecting and mitigating threats effectively.
We are hiring for multiple roles.
Threat Detection Team:
With our advanced threat detection solution, we visualize user activity, identify employee compromise, and mitigate insider threats, ensuring data security before a material breach occurs.
Ensuring SaaS applications are robust and compliant with industry standards. You'll focus on real-time monitoring, proactive vulnerability mitigation, and managing sensitive data access for optimal security and continuous compliance.
Obsidian Security | Threat Backend Engineer | Newport Beach, Palo Alto, Philadelphia | Onsite or Remote | Full-Time
Obsidian Security is at the forefront of SaaS security, dedicated to detecting and mitigating threats effectively.
We are hiring for multiple roles.
Threat Detection Team:
With our advanced threat detection solution, we visualize user activity, identify employee compromise, and mitigate insider threats, ensuring data security before a material breach occurs.
Ensuring SaaS applications are robust and compliant with industry standards. You'll focus on real-time monitoring, proactive vulnerability mitigation, and managing sensitive data access for optimal security and continuous compliance.
Obsidian Security | Threat Backend Engineer | Newport Beach, Palo Alto, Philadelphia | Onsite or Remote | Full-Time
Obsidian Security is at the forefront of SaaS security, dedicated to detecting and mitigating threats effectively.
We are hiring for multiple roles.
Threat Detection Team:
With our advanced threat detection solution, we visualize user activity, identify employee compromise, and mitigate insider threats, ensuring data security before a material breach occurs.
Ensuring SaaS applications are robust and compliant with industry standards. You'll focus on real-time monitoring, proactive vulnerability mitigation, and managing sensitive data access for optimal security and continuous compliance.
What makes this particularly novel is the realization that traditional security measures, designed primarily for on-premises infrastructure, may not be enough to combat these SaaS-based attacks effectively.