Which BADge do you deserve?
We all make mistakes - some worse than others. Let's acknowledge our shared imperfections and find humor in them. Together we can foster a culture that celebrates our humanity and the lessons learned from our errors.
Award - Click 'Award' to share why a colleague especially deserves a BADge. You will both be entered in a drawing to win some cool BADges swag.
Share - on LinkedIn and Twitter, or share it internally on your messaging system with your colleagues!
Click ‘copy BADge’ to copy it to your clipboard, then paste it anywhere.
(IOS users can long-press on the BADge then select “Copy Image”).
Click ‘copy BADge’ to copy it to your clipboard, then paste it anywhere.
(IOS users can long-press on the BADge then select “Copy Image”).
Want more? You can Contribute! - BADges is an open source project. You are welcome to star it and raise a PR to add new BADges ideas.
Software Engineering
Shift-Right Advocate
Prefers testing in production rather than shifting it left to the development phase, risking user-facing issues.
Development Velocity Manipulator
Artificially inflates or deflates development speed metrics to serve their narrative.
Job Security Specialist
Writes complex, hard-to-understand code to make themselves indispensable to the project.
Meetings Maestro
Spends more time in meetings than actual development, reducing productivity.
Git Push --Force
A sly Code Review Hater, simply forces a code push bypassing all governance and policy automation.
Spaghetti Coder
Writes code with complex and tangled control structures, making it difficult to maintain and understand.
"Works on my Machine" Certified Developer
Dismisses bugs because the code works on their local setup, ignoring potential environment-specific issues.
WFH Napper
Prefers to take unexpected breaks during work-from-home, slowing down the team's progress.
Code Review Hater
Avoids code reviews, leading to unchecked code getting merged into the main branch.
Master of Non-Reproducible Defects
Creates bugs that are hard to reproduce, leading to wasted debugging efforts.
Legacy Code Enthusiast
Resists updating old, inefficient code, slowing down technological progress.
Cloud Platform Engineering
ClickOps Specialist
Prefers doing everything manually via UI clicks, rather than automating it using IaC.
Cloud Waste Maintainer
Doesn't optimize cloud resources, leading to wasteful expenditures.
Infra Drifter
Changes infrastructure configuration directly through the web console, completely ignoring the IaC pipeline.
Master of Vendor Lock-In
Designs systems heavily dependent on a single vendor's technology, limiting flexibility and resilience.
Accidental TF Destroyer
Has a knack for unwittingly running "terraform destroy", erasing infrastructure components accidentally.
Cloud Cost Maximization Expert
Selects the most expensive cloud services without optimizing for cost.
Bare Metal Ambassador
Staunchly advocates for traditional, non-cloud-based solutions, often hindering modernization efforts.
Keeping Dev EC2 Running All Night
Forgets to shut down development instances leading to unnecessary cloud costs.
Cloud Complexity Coacher
Always selects the most complex solution over simpler, equally effective alternatives.
Site Reliability Engineering
Distributed Monolith Architect
Creates a system that is theoretically distributed but in practice behaves as a single monolithic application.
Poor-Availability Architect
Designs systems that lack proper redundancy and failover mechanisms, leading to frequent downtimes.
Alert Dismisser
Ignores or turns off important system alerts, often leading to overlooked critical issues.
Unscheduled Maintenance Specialist
Frequently causes unplanned downtime due to their reckless approach to maintenance.
Inflexible Scalability Specialist
Designs systems that resist scaling causing performance bottlenecks and service outages during high demand.
Direct-to-Prod Promoter
Known for pushing changes directly to production, skipping important testing and staging environments.
SecOps
Home IP Whitelister
Ensures their home IP is always whitelisted, causing potential security issues.
Sock 2 Compliance
Uses this compliance certification as a shield to avoid implementing essential security practices.
S3 Bucket Exposer
Frequently leaves cloud storage buckets publicly accessible, risking sensitive data exposure.
Non-Compliant Compliance Expert
Talks a lot about compliance but fails to implement compliant practices.
Most Privileged
Always operates with the highest system permissions, disregarding the principle of least privilege.
Zero-Trust Skeptic
Rejects the zero-trust security model, risking unauthorized access and data breaches.
Always Run as Root
Regularly uses root or administrator access, disregarding the best practice of only escalating when necessary.
Cloud-Captive Security Specialist
Relies upon cloud-provided security features, overlooking potential security risks inherent in their code and architecture.