I hear people talk about leaky abstractions all the time. I’m not sure that some of the people that use it have researched the term.
Content
Latest posts & podcasts from built.fm, dave.dev & historic content from ipengineer.net & arsonistgopher.com
Part three introduced the first three key skills. This part presents the introduction to the last three core skills and a call to action.
This is the first post of a series on the persona between “network engineer” and “developer”.