Comment by don-code

Comment by don-code 9 days ago

0 replies

This is, in some way, endemic to all branches of software. Every group of practitioners has a shared vocabulary - as the article says, it's exploiting an efficiency. If we all have a common language, we can speak more efficiently about what we're doing, and what needs to be done.

That said, how approachable that vocabulary is reflects how approachable the community around it is.

For instance, I've found the DevOps community to be very open and accessible to newcomers. There is shared language - orchestration, config management, even some acronyms like CI/CD - but they generally seem to use approachable language. I've also found the Python and Ruby communities to be very welcoming and willing to teach newcomers, and while I'm not involved in it, I've heard the Rust community really shines here.

On the other hand, one of the reasons I've stayed away from the security community is its propensity for acronyms. SIEMs, CSPMs, ASPMs, SASTs, DASTs, EDR tools, and maybe you've even got a CISSP cert.. It's not approachable, and I've found that many security practitioners wear knowledge of these acronyms as a badge of honor. I've found the networking community even more toxic: there are some pieces of software I've used for over 20 years, with forums I avoid like the plague, because many questions are answered with some variety of "Read the docs!" or "You don't KNOW?!?!"

If I were a benevolent-dictator-for-life and had to bootstrap a community, I'd be aiming to foster the former, not the latter.