"We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth."
"We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity."
"We must declare our virtual selves immune to your sovereignty, even as we continue to consent to your rule over our bodies. We will spread ourselves across the Planet so that no one can arrest our thoughts."
• • •
Missing some Tweet in this thread? You can try to
force a refresh
My first (big) breakthrough in the tech startup scene?
It had zero correlation with dev skills and everything to do with presenting on how to solve business problems with techology.
A short story of my "Drupal Means Business" talk. (thread)
First, none of this would have happened without the mentorship from my late friend Rick Nashleanas.
I attended his local presentation on a similar topic, and I immediately approached him asking how we amplify this message to other developers/agencies. /2
Rick's passion was contagious, and rather than try to take my ideas... he volunteered (volun-told?) me to help with the upcoming Drupal conference in Denver. And he specifically asked for me to run an all-day stage called "Drupal Means Business". /3
The recent SA-CORE-2018-004 and SA-CORE-2018-002 security advisories have sparked a lot of conversations in the Drupal community regarding all things security. IMHO, it's important to highlight several talking points to keep things in perspective.
1/Timing. In both cases, it is believed that the patches and releases occurred before any publicly known or widely used exploit. This is huge. This means the community had a marked advantage in addressing before mass exploits were attempted.
2/Responsible Disclosure. Individuals finding these vulnerabilities decided to work with the Drupal Security team rather than disclose publicly. This is huge. It allows the community the chance to address proactively versus reactively on a potential 0-day exploit.