1478
Real examples here? (discuss.tchncs.de)

Friend who is not a software person sent me this tweet, which amused me as it did them. They asked if "runk" was real, which I assume not.

But what are some good examples of real ones like this? xz became famous for the hack of course, so i then read a bit about how important this compression algorithm is/was.

you are viewing a single comment's thread
view the rest of the comments
[-] ricecake@sh.itjust.works 1 points 3 months ago

https://daniel.haxx.se/blog/2020/12/17/curl-supports-nasa/

https://daniel.haxx.se/blog/2023/02/07/closing-the-nasa-loop/

Their process for validating software doesn't have a box for "open source", and basically assumes it's either purchased, or contracted. So someone in risk assessment just gets a list of software libraries and goes down it checking that they have the required forms.

As the referenced talk mentions, the people using the software understand that all the testing and everything is entirely on them, and that sending these messages is bothersome and unfair, and they're working on it. Unfortunately, NASA is also a massive government bureaucracy and so process changes are slow, at best.
The TLAs don't generally help NASA, and getting them involved would unfortunately only result in more messages being sent.

As for contributions, I think that turns into an even worse can of worms, since generally software developed by or for the US government isn't just open source, but public domain. I think you'd end up with a big mess of licensing horror if you tried to get money or official relationships involved. It's why sqlite is public domain, since it was developed at the behest of the US.

Mostly just context for what you said. NASA isn't being arrogant, they're being gigantic. Doing their due diligence in-house while another branch goes down a checklist, sees they don't have a form and pops of an email and embarrassing the hell out of the first group.

The time limit thing is weird, but it's a common practice in bureaucracies, public or private. You stick a timeline on the request to convey your level of urgency and the establish some manner of timeline for the other person to work with. Read the line again, but extremely literally: "we have a time frame of 5 days for a response". "Our audit timeline guessed that it would take a business week for you to reply, so if you take longer we're behind schedule". The threatening version is "your response is required on or before five business days from the date of this message".
The presumption is that the person on the other end is also working through a task queue that they don't have much personal investment in, and is generally good natured, so you're telling them "I don't expect you to jump on this immediately, but wherever you can find a moment to reply this week would keep anyone from bothering me, and me from needing to send another email or trying to find a phone number"

this post was submitted on 08 Aug 2024
1478 points (100.0% liked)

Programming

17484 readers
91 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities !webdev@programming.dev



founded 1 year ago
MODERATORS