Skip to content

Commit

Permalink
Merge pull request #477 from publiccodenet/asset-renames-no-spaces
Browse files Browse the repository at this point in the history
Asset renames no spaces
  • Loading branch information
Ainali authored Jan 8, 2024
2 parents 49465a5 + 5aa9ead commit 3bb9c8c
Show file tree
Hide file tree
Showing 10 changed files with 4 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ If more public organizations are helping develop it, the impact will be less har

I agree with Jan: Collaborative methods of public IT-infrastructure are essential, and beside collaboration with other experts on same tasks and services to the citizens, open source gives a possibility of choosing several vendors freely, which means that these public organisations are less vulnerable if a malware attack hits a single vendor.

![]({{site.url}}/assets/if more public orgs.png)
![]({{site.url}}/assets/if-more-public-orgs.png)

**Eric:**

Expand All @@ -46,7 +46,7 @@ Together this creates systems with teams which understand their robustness and r
Vulnerabilities in the code can in general be addressed with external code reviews on a regular basis, which also means that code reviews or bug hunts should be a part of the ongoing process of maintaining the source code.
**This is not, as I see it, a constraint to the code but a requirement for the maintenance process.**

![]({{site.url}}/assets/bug hunt-01.png)
![]({{site.url}}/assets/bug-hunt-01.png)

> Since ethical hacking is a thing, how far is too far?
Expand All @@ -55,7 +55,7 @@ Vulnerabilities in the code can in general be addressed with external code revie
Running security tests on your own infrastructure is just good practice and the term ethical hacking is probably not really applicable to that.
If we’re talking about unsolicited ‘ethical hacking’ from people outside of public organizations, I would say that it is outside of our scope.

![]({{site.url}}/assets/cyber war-01.png)
![]({{site.url}}/assets/cyber-war-01.png)

**Charlotte:**

Expand Down
2 changes: 1 addition & 1 deletion _posts/2022-09-01-how-to-build-strong-community.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ categories:

# How to build a strong community for developing robust and valuable software

![People sitting in armchairs around a coffee table writing on cards]({{site.url}}/assets/Storytelling Workshop Public Code_Amsterdam.jpg)
![People sitting in armchairs around a coffee table writing on cards]({{site.url}}/assets/Storytelling-Workshop-Public-Code-Amsterdam.jpg)
*Participants at the Foundation for Public Code Storytelling workshop in Amsterdam*

## Public Code Promising Practices in conversation with Leslie Hawthorn from Red Hat
Expand Down
Binary file not shown.
1 change: 1 addition & 0 deletions assets/Storytelling Workshop Public Code_Amsterdam.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed assets/bug hunt-01.png
Binary file not shown.
1 change: 1 addition & 0 deletions assets/bug hunt-01.png
Binary file added assets/bug-hunt-01.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed assets/cyber war-01.png
Binary file not shown.
1 change: 1 addition & 0 deletions assets/cyber war-01.png
Binary file added assets/cyber-war-01.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed assets/if more public orgs.png
Binary file not shown.
1 change: 1 addition & 0 deletions assets/if more public orgs.png
Binary file added assets/if-more-public-orgs.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 3bb9c8c

Please sign in to comment.