Octoversary - eight years of optimizing for developer happiness
TL;DR: Reflecting on eight years of shipping at GitHub with a look at some of my most impactful ships.
Today marks my “Octoversary” - eight years to the day from when “Ben Balter is a GitHubber” first became true.1 I’ve had the privilege of shipping many impactful things over the years, and to mark the occasion, I used the milestone as an opportunity to reflect on eight of my favorite ships in roughly chronological order:
1. GeoJSON rendering
My first ship at GitHub was GeoJSON rendering (and later diffing). I still remember pitching @skalnik in the “café” at HQ2 during my onboarding week. The idea at the time was that it was a lot easier for government agencies to publish open data on GitHub (since it was readily understood and already public) than working through the legal, technical, security, cultural, and public affairs challenges of open sourcing software. Not to mention, you get a nice visual artifact, making the value immediately apparent to a wider-audience of non-technical stakeholders (the “boss factor” as I called it then). GeoJSON rendering became part of a broader “land-and-expand” strategy, lowering the barrier to entry for government agencies and the open data community more broadly to take their first step towards joining the open source community on GitHub. To date, about 27 million GeoJSON files have been uploaded to GitHub, and every map has a link to contribute back to Open Street Map, creating a virtuous cycle of open data.
2. Government outreach
My first three years at GitHub were as GitHub’s “Government Evangelist”2 (Née “Government bureaucat” before too many actual government bureaucrats politely pointed out the “typo”), leading the effort to make GitHub the premiere government platform for open source, open data, and of course, open government. During that time more than 2,000 government organizations across more than 75 countries joined the GitHub community, a nine-fold increase from when I joined. It was incredible to see the conversation within the government community shift from “what is open source?” to “why would I open source?” to “how do I open source?” to eventually “how do I open source better?”. There were too many amazing milestones to list them all, but we made GitHub available on AWS GovCloud (our first FedRAMP compliant environment) so that US Federal agencies could use GitHub more securely, and were listed on GSA Schedule 70 so that agencies could more easily procure private repos for development with contractors and between agencies. A number of notable projects were also open sourced on GitHub during that time, but my favorite has to be the White House using GitHub for public comment on the US Open Data Policy. Today, the efforts live on in what is now GitHub’s Public Sector team.
3. GitHub Pages
Shortly after I joined GitHub, there were a number of features I wanted for my personal site, which runs on GitHub Pages (namely then, updating to Jekyll 1.0). At the time, GitHub’s internal repos were run more like open source projects: anyone in the company could submit a pull request, so I did just that. When no one responded, I learned that I had become the de facto Pages maintainer, a role that became “official” a few years later.
When I first encountered the GitHub Pages source code, it was a ~100 line shell script with 10-minute build expectations. 250+ pull requests (plus many more from other contributors like @parkr) later, Pages is more robust, more secure, and more feature rich. The publishing experience for end users went from twelve steps to two (commit a Markdown file and enable GitHub Pages). You can now use plugins (a number of which I wrote, themes (both gem-based and remote), and collections, and if anything goes wrong, you now get rich build feedback. Not to mention, we brought worry-free HTTPS to millions of Pages sites. Today, GitHub Pages is so much more than “Geocities for the next generation”. I’m proud of how far it’s come in advancing software documentation and the broader dialog within the open source community, and with GitHub Actions in the picture now, I can’t wait to see where the team takes it next.
It’s no secret that I’ve written a number of posts about GitHub’s culture and communication patterns over the years. More than a hundred, to be exact, and just shy of 200,000 words. That’s about a 2,000 word post a month on average for eight years straight. While they weren’t all novel or insightful, a few did gain some notoriety within the community.
I was recently asked about how I wrote so “prolifically” (their words). Beyond ranting to the void about minor annoyances3 and having a lot of time on planes at a time before in-flight Wi-Fi was tolerable (creating a natural space for disconnect and reflection), I developed a rule in my early years of government outreach so that I could better scale my own efforts of offering white-glove support to our government customers: If I’m asked the same question twice, I reply the third time with a URL. That rule stuck with me as I changed roles across open source, government IT and procurement, collaborative workflows, product management, and trust and safety. It’s even become a running joke among some of my peers, as in “I bet you already have a blog post about this, but how do I…?”. Have something you’d like me to blog about? Let me know.
5. Open source licensing
As a side project to scratch an intellectual itch, I created Licensee. The problem I was trying to solve was simple: given an open source project, how do I know under what license the project is distributed? Beyond what the project may claim in a README or package management file, how do I know that the text in the LICENSE file really is the text of the license. How do I know the author didn’t add “by using this software, you promise to give me a puppy” to the terms?
To encourage open source license adoption, We launched choosealicense.com in hopes of demystifying the confusing world of open source licensing, and added a license picker to the repository creation flow, a move that had a noticeable impact on the number of open source projects on GitHub. Today, Licensee continues to power license detection on GitHub (and our own internal compliance tooling), making high-confidence license information available via the GitHub UI (and API), further demystifying open source licensing by telling you exactly what you can and can’t do with a given project, and nudging the universe of open source licensing towards standardization in the process.
6. Trust and Safety
In 2016, after surprising my team (and then department head) at an offsite (“mini-summit” in GitHub speak) with a presentation on why my role should be eliminated, I moved to the Product organization, and after several rounds of pleading that I was a poor fit, became the Product Manager for what eventually became our Trust and Safety team - ensuring developers didn’t have to risk their privacy or personal safety to participate in the open source community on GitHub.
In my five years on the amazing team, we had more than 500 incredibly impactful ships, including site-wide community guidelines, comment edit history, minimized comments, contributor badges, interaction limits, the triage and maintainer roles, and countless internal moderation tools. Not to mention, we closed dozens of abuse vectors, most visible of which were preventing namespace reuse attacks, and closing our largest account takeover vector, which was responsible for tens of thousands of compromised accounts each year. As I moved on to my current role, I’m proud to have left GitHub a safer, more welcoming space for all developers.
7. Removing non-essential cookies
The now-ubiquitous cookie consent banners are universally accepted as a subpar user experience when compared to more customer-centric approaches to data collection. Rather than clutter GitHub’s interface with cookie consent banners to meet EU regulations, in December of 2020, we decided to remove Google Analytics and other privacy-invasive trackers from GitHub.com and nearly a hundred other domains and subdomains.
When a developer visits GitHub.com, the best experience is one where they don’t have to think about whether their privacy is at risk, trust GitHub to make the decision in their best interest due to GitHub’s privacy-centric reputation, and can immediately begin interacting with the site to accomplish their desired task. Fortunately, GitHub is in a unique position, in that it does not rely on ad revenue or otherwise seek to monetize its customers’ information. As such, we were able to absorb that complexity on behalf of customers by simply limiting what data GitHub collects and how we collect it, avoiding the need for the consent banners in the first place. It’s what I believe the EU regulations intended, and a move I hope other privacy-centric companies will follow in the years to come.4
My most recent ship, and arguably the most impactful, was ensuring that GitHub couldn’t be used as a platform to further child abuse or violent extremism by scanning uploaded images for evidence of child exploitation and extreme violence. To do this, we implemented Microsoft’s industry-standard PhotoDNA service, which uses complex fingerprinting methods to detect, disrupt, and report the distribution of various forms of illegal content.
Two aspects of the 2+ year-long project uniquely stand out: First, it’s rare even within Trust and Safety to find such an elegant solution to a complex problem. This essentially set-it-and-forget-it feature from GitHub’s standpoint has the potential to make the world a tangibly safer place (and can result in someone landing in literal jail). Second, it arose organically, not as a means to a compliance end. Early in the project as we were seeking support from internal stakeholders, when asked where the impetus for the project came about, our team could proudly reply that we were doing it because it was the right thing to do (and it was).
GitHub has changed a lot since I first joined a quirky startup eight years ago, but also a lot of what makes it special has stayed the same. This week I start a new chapter as a Staff Technical Program Manager at GitHub,5 and I’m looking forward to seeing what impactful ships lie in the years ahead.
Get it? Octo, eight… clever, right? ↩
Long-form sub-tweeting before sub-tweeting was a thing. ↩
I also removed Google Analytics and Twitter Analytics from this site around the same time, but that decision didn’t get the same fanfare. ↩
If you enjoyed this post, you might also enjoy:
- Why open source
- 19 reasons why technologists don't want to work at your government agency
- Five best practices in open source: external engagement
- 15 rules for communicating at GitHub
- Twelve tips for growing communities around your open source project
- Ten ways to make a product great
- 10 lessons learned fostering a community of communities at GitHub
- Four characteristics of modern collaboration tools
- The difference between 18F and USDS
- Why everything should have a URL
- How I re-over-engineered my home network for privacy and security
Ben Balter is Chief of Staff for Security at GitHub, the world’s largest software development platform. Previously, as a Staff Technical Program manager for Enterprise and Compliance, Ben managed GitHub’s on-premises and SaaS enterprise offerings, and as the Senior Product Manager overseeing the platform’s Trust and Safety efforts, Ben shipped more than 500 features in support of community management, privacy, compliance, content moderation, product security, platform health, and open source workflows to ensure the GitHub community and platform remained safe, secure, and welcoming for all software developers. Before joining GitHub’s Product team, Ben served as GitHub’s Government Evangelist, leading the efforts to encourage more than 2,000 government organizations across 75 countries to adopt open source philosophies for code, data, and policy development. More about the author →