PPC

PiedPiperCoin

$2.51 USD

Market Cap: $3,388,500

Volume: $1,174,680

Learn More

We’re Hiring!

That’s right, dear readers: Because we now have funding from Mr. Hanneman, we in the Pied Piper family hope to soon have the stork bring us several well-qualified, bouncing baby programmers! While we will be hiring front and back end web app developers and an implementation engineer at some point, for now we are looking to hire for the four below roles.

Resumes will not be accepted from any of the email/IP addresses I have compiled which have left certain comments on my blog. These are comments that have threatened my person or encouraged me to perform acts not possible under the laws of physics, although I suspect a percentage of them may originate with PP’s Gilfoyle or Dinesh, in which case they’re all in good fun!

One note: In addition to these very modest requirements for each position, we also require that all applicants be non-smoking, dog-friendly, fat-positive and respectful of the diversity in gender, race, religion, ableness, sexuality, age and weight which we hope to soon create. Also, tolerance of extreme rudeness, Satanism and marijuana use is recommended.

CORE COMPRESSION LIBRARY ENGINEER (C++ PROGRAMMER)

Requirements:

  • Deep expertise with C++/Java/C# development developing data compression algorithms.

  • 5+ years with C++.

  • Knowledge of downstream video platform components, including encoding, muxing, CDNs, signal processing, workflows and broadcast standards.

  • 3+ years experience with client-server and peer-to-peer architectures, network security, basic network protocols (e.g. TCP/IP and UDP), object oriented design.

  • Understanding of memory management, multiple processor use, runtime optimization, concurrency and synchronization.

  • Experience in building and running large scale distributed online services.

  • Experience with large distributed database design.

  • Proven track record of design/architecture of a large components.

  • Background in mathematics, including linear algebra and numerical methods.

  • BSc or MSc in Computer Science or related degree.

API DEVELOPER (JAVA)

Requirements:

  • 5+ years of development experience in web-related technologies such as Web Services, REST, SOAP, WCF, ASP.Net, C#, JavaScript, AJAX, JSON and XML.

  • Experience defining and developing web service APIs.

  • Experience in integrating with web-based products.

  • Experiences with the entire software development lifecycle, including version control, build process, testing and code release.

  • Working experience with an industry standard API Gateway technology such as Layer 7, APIGEE or Intel MASHREY is a plus.

  • Experience with Agile and Test-driven development methodologies.

  • BSc or MSc in Computer Science or related degree.

UNIT TESTER

Requirements:

  • 5+ years of testing & QA automation experience.

  • Experience in an Agile development environment.

  • Experience in Unit and UI testing.

  • Development experience in Java, JavaScript and web services.

  • Experience creating and reviewing test cases.

  • Experience in large-scale, real time video (including streaming) applications.

  • Testing multiple browser-OS environments.

  • Creating test cases.

  • Integration.

  • BSc or MSc in Computer Science or related degree.

VIDEO HACKER (ASSEMBLY)

Requirements:

  • At least 5 years of hands-on experience in C++ application development on Linux OS and extensive experience in Java and Javascript.

  • Knowledge of Linux C++ development tools and environments: make, gcc, gdb, gprof,, subversion, git, shell scripting, Perl, Python or Ruby.

  • Knowledge of virtualization and building distributed video processing systems.

  • Socket and network programming.

  • Multithreading and inter process communication.

  • Object oriented design and software development patterns.

  • Experience with video container formats: .mov / .mp4, .mkv / .webm, mpeg-2 transport stream, .flv.

  • Experience with video compression codecs: AVC, HEVC, VP6, VP8, VP9, ProRes, DNXHD, AAC, Vorbis, Opus.

  • Experience with video delivery formats for streaming and adaptive bitrate delivery: HLS, DASH, RTMP, RTSP, MPEG-2 TS over UDP, Zixi, FASP, WebRTC, and progressive download HTTP.

  • Experience with mezzanine file asset ingestion via SFTP and Aspera.

  • Network multicast, protocols, routing and topology.

  • Experience with video processing and broadcast standards. Deinterlacing, scaling, aspect ratios, telecine, etc.

  • Experience building end to end video workflows with a true glass to glass scope. Capture, process, encode, deliver, decode, and display.

  • Knowledge of workflows for stitching multiple cameras into equirectangular spherical videos.
Comments (17,891)

Your email address will not be published. Required fields are marked *

*

  1. First put a scrollview in that profile page and second hire me !!!! You need to fill up that empty 6th spot, I am a coder, I do parkour but did acting for a while and play guitar so if ya need a cool intern I AM TOTALLY IN !

    Check my resume on my website and feel free to add me in any of those social medias !
    http://www.zepvalue.com
    Giuseppe

  2. Can you hire me? I have solid experience in JAVA, know some design patterns and software architecture principles

  3. I have no knowledge of any of that shit, but I did stay at a Holiday Inn Express!!
    And I’m an expert at shhhhhwag!

  4. Standing ovation for you people… One of the best series ive seen.
    Quick question, when Will the next season preview?

    My best to all.

  5. hey guys , i am just Mobile application programmer and i can develop piedpiper for iOS and Android OS single handedly 🙂
    Already developed secured army apps .

    By the way i am happy for Kumail . As Pakistani-American , you are doing good Job and we are not terrorist after all 😛 .

    Thanks

  6. hey guys , i am just Mobile application programmer and i can develop piedpiper for iOS and Android OS single handedly 🙂
    Already developed secured army apps .

    By the way i am happy for Kumail . As Pakistani-American , you are doing good Job for showing we are not terrorist after 😛 .

    Thanks

  7. Hey Dineash, I am your Oxford classmate. I just graduated from our CS Department. Could you please as Richard for a favour. I need a reference letter to apply for a job in Hooli. I guess Richard’s reference would be perfect. By the way, I am also learning how to invert a binary tree. I believe I am better than Max Howell.

  8. ████████╗██╗ ██╗██╗███████╗ ██████╗ ██╗ ██╗██╗ ██╗ ███████╗██╗ ██╗ ██████╗██╗ ██╗███████╗
    ╚══██╔══╝██║ ██║██║██╔════╝ ██╔════╝ ██║ ██║╚██╗ ██╔╝ ██╔════╝██║ ██║██╔════╝██║ ██╔╝██╔════╝
    ██║ ███████║██║███████╗ ██║ ███╗██║ ██║ ╚████╔╝ █████╗ ██║ ██║██║ █████╔╝ ███████╗
    ██║ ██╔══██║██║╚════██║ ██║ ██║██║ ██║ ╚██╔╝ ██╔══╝ ██║ ██║██║ ██╔═██╗ ╚════██║
    ██║ ██║ ██║██║███████║ ╚██████╔╝╚██████╔╝ ██║ ██║ ╚██████╔╝╚██████╗██║ ██╗███████║
    ╚═╝ ╚═╝ ╚═╝╚═╝╚══════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝ ╚═════╝ ╚═════╝╚═╝ ╚═╝╚══════╝

Problem 1:

Single Points of Failure

Libraries are vulnerable to losing their collection because all of their books are contained at a single location. Say, for instance, that there was a fire, or a flood, or a vandal defaced John James Audubon’s masterpiece Birds of America by giving all the Warblers human genitalia. Even worse, if the vandal recruited bird haters from other neighborhoods and got ahold of all the copies of the book in existence, it could be lost crude doodles forever. It would be a tragedy on par with the destruction of the Library of Alexandria.

The Problem

Because Birds of America is centralized in one public location, it’s susceptible to permanent deletion. The same goes for content on the Internet — storing all your family photos on a single account in a cloud service? They could all be wiped away if someone hacked your account or corrupted the host servers.

The Solution

Our solution: In our decentralized library, we would duplicate and distribute multiple copies of Birds of America to your neighbors — if you need a copy, you would just go to your neighbor’s house. As our Pipernet town of mobile devices grows, so do the number of neighbors who might have a copy of your book. And the more potential copies there are available, the more secure the book is.

That’s what our new internet will allow you to do too: spread your personal files on devices across the world, so they’re completely safe from bad actors manipulating or deleting them.

Takeaways

All copies of your files in a well-known, hackable location = RISKY!

Files copied and distributed to multiple locations = SAFE!

Problem 2:

No Privacy

In order to check out books, you must have a library card — an ID that links back to your real world identity. That library card reveals all the books you’ve ever checked out, where you returned them, and whether they were returned on time.

The Problem

The tech titans collect data profiles on us too, and theirs are far more comprehensive. They amass thousands of personal data points by tracking our activities in both the online and physical worlds.

Users don’t own or control their own data, so it can be used against them. Take, for instance, Richard’s lawyer Pete Monahan, who had his probation revoked when the state retrieved his library records. Which was… probably a good idea. But for this metaphor’s purposes: bad that they can access that information!

On the web, our data profile is far more detailed, the laws around privacy even looser, and more freedoms are at stake. For example, what if Hooli sold your search data to an insurance company who then denied you coverage because you’ve HooliSearch-ed “kindest Palo Alto based Cardiologist” a few too many times?

The Solution

Replace library cards with anonymous identification cards which are impossible to connect to your real world identity. Instead of using a library card (linked to your name, address, etc.) to check out books, you would swipe a nondescript card (containing no personal details). Your activity would be tracked to keep the system stable, but your identity would not be siphoned and sold. I, for example, would no longer check out books as "Donald Dunn," but rather the nom de guerre "h3w0vbk37vpm."

That’s what our new internet will allow you to do too: use its apps and services without compromising your privacy.

Takeaways

Trading your identity and data for online services = RISKY!

Using services anonymously so nobody can target you = SAFE!

Problem 3:

Censorship and Manipulation

Because a town’s library is run by a small group of administrators, they could theoretically decide what books are available to its people. They could even decide to ban Birds of America, depriving young birders of Audubon’s elegant illustrations, pored over page by page under a government-issued blanket after lights out, giving you hope that even a slender-framed, shivering boy could grow to be as majestic as a Hooded Merganser.

The Problem

On the internet, multinational corporations can screen content, or even “adapt” their services to fit the local government’s requests. In both libraries and on the Web, we’re susceptible to data being censored or manipulated by intermediaries.

The Solution

A peer-to-peer lending system backed up by a fully public ledger, allowing you to send and receive books freely to anybody in the world without worrying about censorship or interference. Want to add Catcher in the Rye, Fahrenheit 451, or your controversial essay on Audubon’s coloring techniques? No problem, even if the town surrounded you with pitchforks to ban them, these vital texts would be available to share neighbor to neighbor, impossible to delete.

That’s what our new internet will allow you to do too: exchange messages and files directly with their intended receiver, disperse ideas and information free from threats of censorship.

Takeaways

Pushing all transactions through a central authority = OPPRESSIVE!

Establishing a peer to peer exchange system based on an immutable public ledger = FREE!

Back
to top