For a recent presentation I also tried reveal.js again and I really liked it overall (compared to LO Impress). I do science, so I'm not that into annotating source code, but this total lack of presentation "spice" also really bugged me and I basically ended up writing html with semitransparent overlays over key graphics (more of an explorative presentation)...
As to this: I just don't get what's so special about this. I especially don't get, what this could do, what plainly putting your presentation into git doesn't do already? Apparently behind the curtains (which probably does not concern people who do `curl <url> | bash` stuff...) it's using pandoc to convert md to a reveal-js presentation and using a node-based live-server for display. Not even sure if speaker notes work (or if you have to use the reveal.js internal server for that)...
Also, this is a security nightmare, as a ton of boilerplate-dockercode/npm-packages/random-binaries is necessary for just about nothing, as in the end it's just downloading the pandoc-binary from github to a docker-container (well, building pandoc was to hard apparently). I'm scrambling my head, what this means for security in applications developed by people lead by the poster if he goes forward like this.
As to this: I just don't get what's so special about this. I especially don't get, what this could do, what plainly putting your presentation into git doesn't do already? Apparently behind the curtains (which probably does not concern people who do `curl <url> | bash` stuff...) it's using pandoc to convert md to a reveal-js presentation and using a node-based live-server for display. Not even sure if speaker notes work (or if you have to use the reveal.js internal server for that)...
Also, this is a security nightmare, as a ton of boilerplate-dockercode/npm-packages/random-binaries is necessary for just about nothing, as in the end it's just downloading the pandoc-binary from github to a docker-container (well, building pandoc was to hard apparently). I'm scrambling my head, what this means for security in applications developed by people lead by the poster if he goes forward like this.