VisArch(@ruthmalan) 's Twitter Profileg
VisArch

@ruthmalan

Curious (with a focus on architecting for agility, integrity and sustainability). she/her

@[email protected]

ID:141165981

linkHttps://www.ruthmalan.com calendar_today07-05-2010 10:18:04

74,3K Tweets

9,2K Followers

8,1K Following

EFF(@EFF) 's Twitter Profile Photo

Using your face or thumbprint to unlock your phone is convenient, but courts may grant less legal protection to biometrics. EFF’s Andrew Crocker spoke to Gizmodo about passwords and the Fifth Amendment. gizmodo.com/stop-using-you…

account_circle
Hank Green(@hankgreen) 's Twitter Profile Photo

And, yes, the hospital in Sierra Leone is now under construction, largely financed by, not just socks, but a suite of other products we have available at a store that donates 100% of its profit to make the world a better place at Good.Store.

account_circle
VisArch(@ruthmalan) 's Twitter Profile Photo

Next Technical Leadership Masterclass: July 16 and 23, 2024, 12pm-3pm Eastern Time (US/Canada)

Early enrollment: limited number of discounted tickets

Enroll: ti.to/bredemeyer/tec…

Preview material: Decisions for Technical Leaders (pdf): ruthmalan.com/Leadership/202…

Next Technical Leadership Masterclass: July 16 and 23, 2024, 12pm-3pm Eastern Time (US/Canada) Early enrollment: limited number of discounted tickets Enroll: ti.to/bredemeyer/tec… Preview material: Decisions for Technical Leaders (pdf): ruthmalan.com/Leadership/202…
account_circle
Dorothea Baur (Dr.) (also on bsky)(@DorotheaBaur) 's Twitter Profile Photo

To all those who struggle to understand the difference between a human who goes to a museum and paints a picture back home and the way generative AI works - maybe this helps?
Unless your lack of understanding is ideologically motivated of course...

account_circle
VisArch(@ruthmalan) 's Twitter Profile Photo

'You wonder why some effects of a policy are called 'side effects' when they are as real and direct as the 'main effects.'' -- Donella Meadows

account_circle
Paul Harland(@PabloRedux) 's Twitter Profile Photo

VisArch JJ Bryson 2 Maxwell Ramstead Sergi Valverde🌍 Stuart Boardman Mairtín Cunneen Josh Gellers Paresh Kathrani David J. Gunkel John Flood 'There are no side effects—only effects.' 'All models are wrong: reflections on becoming a systems scientist' by John D. Sterman: web.mit.edu/jsterman/www/A… 'We measure what we care about, and those measurements alter what we believe is important.'

account_circle
indu@hachyderm.io(@Indu_alagarsamy) 's Twitter Profile Photo

I’ve been recently trying to get into a better writing practice to share some of my thoughts in the architecture modernization space.

One of the primary problems of modernization is how can you understand a system’s current state. My take:

domainanalysis.io/p/different-wa…

account_circle
Erica Stanley(@ericastanley) 's Twitter Profile Photo

I've been fairly quiet about this for a few reasons: 1) I was as shocked as anyone by the news 2) Angel Banks, bethlaing & I are working to gracefully transition our local Women Who Code Atlanta community of 5K+ technologists. We built this community from the ground up and 1/n

account_circle
Marissa Meador(@marissa_meador) 's Twitter Profile Photo

On the eve of the divestment protest, IU changed policy to forbid tents w/out IU approval.

Thursday morning, they posted the change to their website.

That afternoon, police arrested 33 protesters for violating policy. Indiana Daily Student

idsnews.com/article/2024/0…

account_circle
Nic Napier(@nicnapier1) 's Twitter Profile Photo

IU changed its campus policy a day before yesterday's protest and encampment. An IU constitutional law professor argues this is not a neutral policy, meaning it likely violates protesters' 1st Amendment rights.

Marissa Meador has more:

idsnews.com/article/2024/0…

account_circle
Kelsey Hightower(@kelseyhightower) 's Twitter Profile Photo

In 1984, Ken Thompson had the best take on software supply chain security: 'The moral is obvious. You can't trust code that you did not totally create yourself. No amount of source-level verification or scrutiny will protect you from using untrusted code.' dl.acm.org/doi/10.1145/35…

In 1984, Ken Thompson had the best take on software supply chain security: 'The moral is obvious. You can't trust code that you did not totally create yourself. No amount of source-level verification or scrutiny will protect you from using untrusted code.' dl.acm.org/doi/10.1145/35…
account_circle