Day two of the Digital Summit LA
11:30am and the attendees are released for lunch so I make my way outside to receive my brown bag lunch of turkey and swiss served on a croissant, and a salad. With my bag in hand, I make it back to the conference hall, stage one, and sit at a table. As I open up my bag more people sit next to me and the conversations start: we go around the table and each of us explains what we do and why we are at the summit. I find myself sitting at a table with a “manager of marketing marketing” — yes, a real job title– and a few other people who work in similar fields. During our conversations, I start handing out my business card.
A marketing manager for an accounting firm studies my card and then smiles and says, “We code the impossible” and then looks at me and says “That’s a great tagline! Tell me more about it.” I told her that during our 25+ years in the custom software development business we’ve completed numerous projects that other developers told our clients were “impossible.” I added some examples from past projects and talked a bit about the fact that we do a lot of work that we’re not allowed to discuss or use in our marketing. By the time I was done describing what we mean by our tagline, she said she thought our work was exciting and that our goal of doing the “impossible” would make her want to hire us. This was not the only time this happened during the two days I was at the conference.
If you’ve ever been told that a software project you want to develop is “impossible,” reach out to us. Tell us about it, I’m pretty sure that if our developers can’t engineer a solution for you, then your idea might actually be impossible. Usually, though, we tend to relish the opportunity to take on a seemingly insurmountable challenge and come up with a solution that thrills our client, even if we can’t talk about it afterward.
Spot the Vulnerability: Loops and Terminating Conditions In memory-unsafe languages like C, special care must be taken when copying untrusted data, particularly when copying it to another buffer. In this post, we\'ll spot and mitigate a past vulnerability in Linux\'s...