Hacker News new | past | comments | ask | show | jobs | submit | etagwerker's comments login

I'm glad this topic if finally getting the attention it needs.

I really like Google's paper on technical debt: https://ieeexplore.ieee.org/document/10109339

I wrote an article with a summary of the key insights in that paper: https://www.ombulabs.com/blog/tech-debt-maturity-model.html

Hopefully, the more articles like this one, the more non-technical managers will finally give a shit about technical debt?


Ombu Labs (https://www.ombulabs.com) | Software Engineer | Philadelphia, PA; Buenos Aires (ARG); or REMOTE | Full Time

Ombu Labs, The Lean Software Boutique, is hiring a full-stack software engineer to work on our products and consulting projects.

What we do: We aim to write less software. We take YAGNI to the next level. We apply lean principles to our own products and our client's products.

Why us: You will be our 4th software engineer hire. We are a small/agile company passionate about open source, pair programming, Ruby/Rails, and continuous improvement.

Tech we use: Ruby, Javascript, React.js, Backbone.js, Rails, Sinatra, Cuba, AWS, Heroku, Git, Slack, Screenhero.

If you're interested, please apply here: https://www.ombulabs.com/jobs.

If you have any questions, feel free to message me.


Location: Philadelphia, PA

Remote: Yes

Willing to relocate: No

Technologies: Ruby, Rails, Sinatra, Cuba, Rack, Javascript, Node.js, Backbone.js, React.js, Angular.js, iOS, Android, HTML, CSS, AWS, Heroku.

Résumé/CV: https://www.ombulabs.com/#clients

Github: https://github.com/ombulabs

Blog: https://ombulabs.com/blog

Email: hello@ombulabs.com


Yeah, Mercado Pago has been around more than Stripe, but they are still rookies when it comes to their platform's security.

See Stripe's Security section: https://stripe.com/help/security

I'm still trying to find Mercado Pago's Security section and security vulnerability protocol (e.g. Who do I contact when I find the next security hole?)


Just because they're not doing it like Stripe doesn't mean they're rookies, they also did $7.1 billion in transactions last year. Most companies have pretty obscure/lacklustre security outreach, it's something that's getting a lot more emphasis these days than it used to.


Just because they did $7.1 billion in transactions last year, it doesn't mean they're not rookies.

Most of the big IT companies in this side of the world follow the ideology of "we don't care about doing things correctly, we only care about getting the stuff done" and succeed because of the traction they generate due to the lack of serious competition.

Recently Amazon joined the e-commerce arena in Mexico, but my expectations are that Mercado Libre will follow the footsteps of Ask.com, Source Forge, etc. instead of improving, they have been arbitrarily doing UX anti patterns in the last years in order to protect their income at the expense of the users.


Maybe rookies wasn't the right word.

The fact that they allowed such a blatant vulnerability to reach production makes me question their test suite and development process. What else is wrong that we are not seeing?

I expect more transparency and professionalism from a company that processes $7.1 billion in transactions.


It's not unreasonable to expect better transparency, that's something that's improving too slowly. We don't even know if this was exploited yet and it's been a couple months and there's always a lot of opacity around hacking incidents.

Security is hard and accidents are easy, dropbox once had a four hour period where they didn't verify passwords!

http://techcrunch.com/2011/06/20/dropbox-security-bug-made-p...


That is pretty embarrassing too and even a bigger vulnerability, but Dropbox released a statement about it.

I believe that owning up to your mistake and being transparent about it can only make your customers trust you more. What worries me is that Mercado Pago is huge and they never released a statement about this issue. I hope that they change this policy soon.


Using their authentication mechanism, a user should only get an access token with the right combination of client id and client secret.

For at least 7 hours, anyone could get an access token for any client id, without entering the right client secret. With that access token they could see a lot of information for any account.


I've updated the post title with your suggestions. Thanks!


Yes. I wish they were more like Github or Stripe about disclosing this sort of information.


This is usually how I do it for libraries:

* Read the README.

* Install it and start using it with a couple of sample cases. That will give you an idea of what it does.

* Read the test suite. This will give you a better idea of what the library does.

* Look at the directory structure. This should tell you where things are.

* Start reading the core files.

* Start looking at open issues. Try to solve one by adding a test and changing the code.

* Submit a pull request.


Couldn't you do the same with RSpec or straight Capybara code?

I no longer see the added value of Cucumber when you work in a project that has no non-technical team members writing tests.


If I go to my stakeholders and customers with Spec or Unit code, and ask them: "Does this test represent your idea of how this feature should work" I'll get no useful answers.

I can read it to them, or we could collaborate on a user story that doesn't get directly mapped to tests, but then we have room for the interpretation/translation process to create the wrong assumptions in the test code.

There are plenty of tests I'd never show the customer because they involve implementation details, and those aren't going to be written in Gherkin because I don't hate myself enough to juggle that many regexps.


The value is when you have non-technical members reading tests.


I've been using Cucumber for almost 3 years now, but if I were to start a new project today I'd pick Capybara with MiniTest or RSpec.

When I first started using Cucumber I thought it was cool that "anyone could read the test and understand it"

But that one advantage doesn't really matter that much when everybody in your project knows Ruby and doesn't need the natural language side of it.


> But that one advantage doesn't really matter that much when everybody in your project knows Ruby

Well, yeah, if people who aren't Ruby coders aren't reading your tests, Cucumber is overboard: the motivating use case for Cucumber is acceptance tests where the main part of the test (the part that isn't implemented in Ruby code) is owned by and validated by the customer/user, who presumably isn't generally, except by coincidence, a Ruby coder.

It might also be useful for integration tests where that need to be validated by people familiar with the overall system design/architecture, but not necessarily the language that any particular components are implemented in, for the same reason.


There is some value in using it when everyone knows Ruby: it forces you to get your head out of the code, using language that your customers understand rather than naturally defaulting to codespeak.

I use Cucumber on my own projects when it's just me, for precisely this reason.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: