Talk comments

Eric Poe at 22:54 on 13 May 2019

This is a talk that I mentally review a week later. We go around thinking that others think like we do, yet some of us have no concept of "orange" or think that Beethoven's 5th Symphony smells like rain. This talk is also a great reminder that we all start from a state of ignorance and that we should remember this when we speak with or work with the relatively ignorant.

At points in this talk, I could tell that Jessica was fighting emotions just to talk about the importance of being someone who helps rather than someone who tears down.

This is a keynote that I am glad is a keynote.


Lots of great tips for beginners and for people who are not dedicated sys admins. Roger was very helpful with my questions..

What a set up! You got me. Almost skipped your talk. So glad I went.


Really good session. Lots of excellent information delivered in an engaging and entertaining way. I only have one issue: I was expecting a more advanced approach to testing. The title "Because You Haven't" led me to believe that I would see testing in a way that I hadn't before. But if you already do testing a lot or work doing TDD like I do, you won't find any new information in this talk. It is more geared to a beginner or introduction to testing.

I do give full props for being really well done. I just wish I had known the skill level it was intended for before hand.

NIce job, Chris. Especially enjoyed any part where you ran across the stage!

Jim Wigginton at 11:16 on 5 May 2019

It was a good talk that covered a broad selection of relevant topics.

A few technical nitpicky stuff: you referred to ECDSA as edwards curves. They're not. Ed25519 is a (twisted) Edwards curve. ECDSA consists of 3x NIST curves (nistp256 being the most widely supported one) are probably more aptly called (short) Weierstrass curves. As for the suggestion that the NSA has backdoors in them... that's wholly unsubstantiated. NIST does work with the NSA to validate their standards but there's only one NIST standard that's known, for sure, to have a backdoor - Dual_EC_DRBG. Edward Snowden is the main reason that that one is known. Some people suspect that the NIST curves have backdoors in them but there's zero direct evidence of that. The NIST curves as utilized in ECDSA are, however, more prone to implementation errors, but OpenSSH doesn't have those implementation errors and, anyway, that's a talk unto itself lol.

Matt Trask at 09:12 on 5 May 2019

I thought I was gonna learn about using a hammer.

TJ Draper at 23:19 on 4 May 2019

Wonderful presentation on an important subject. We as developers need to remember to encourage others rather than tearing them down.


Darren Wright at 22:31 on 4 May 2019

Wonderful topic and message, good execution in delivery and lots of food for thought. I've lived similar experiences and taken better paths myself, but still learned some lessons from this talk.


Darren Wright at 22:28 on 4 May 2019

Great use of resources, sorry the demo wasn't able to be shown, but would still be interested in using the skill myself. Talk was entertaining, but consistency in use of they vs. her needs improvement. :D