It’s like if Humphrey Bogart and Tina Fey had a baby. —Stephen Spielberg
ArticlesDownload articles as CSV
I took a week off from work to join a deep dive study group on machine learning. It was an incredible experience and I want to tell you about what I learned.
This is not meant to be a take down piece, and I realize I’m not providing any direct solutions. I wouldn’t be writing about Drupal if I didn’t care about it. My hope is that my thoughts will prove useful in a much larger discussion.
I had written a roundly rejected magic item for a Pathfinder RPG contest some years back, and just stumbled across it again. For those of the game-nerding persuasion, have a look.
I started buying records a few months ago, and I’ve already compiled a large body of imagined insults to my person about why I’d do such a dumb, dusty thing.
This new healthcare overhaul bill in the senate is already deeply unpopular, but for anyone still unconvinced, I’d like to add my own story to the mix.
I recently saw Titicut Follies, the 1969 documentary film about the harrowing conditions in a Massachusetts prison for the criminally insane. The movie was banned by the state of Massachusetts until it was deemed unconstitutional in the late 80s. One of the subjects is a man who has been transferred from a regular prison to this mental facility. He is very clearly sane, and argues logically in his own defense.
Welcome, Internet folks! If you’ve been following along, this is the final post in my three part series on basic Internet security and privacy. In this article, we’re going to get into improving and—just as importantly—understanding Internet privacy.
The Situation ¶ You have a list of items that you need to render with comma separation, and an “and” at the end.
Welcome internet traveler, you’ve found your way to my guide on how to improve your online security. Already feel confident in your security abilities? Then get lost! I don’t need that kind of arrogance around here, especially when I’m trying to sound smart. The rest of you nice, humble people, read on.
Update: The next article in this series is now published . Confused about what privacy versus security means in the context of the internet? Haven’t heard these terms before, but are intrigued nonetheless? Not interested in any of this, but are inexplicably still reading? Whatever your deal is, welcome—you’ve found the laypersons guide to all this crap!
I recently saw Babadook (No spoilers), a fantastic horror movie that was not only scary, but had a compelling, thought provoking, and grounded story to back up the supernatural.
A quick, fun tip for Mac and command line users who are fans of The Lord of the Rings;
The other day I had some time in between work and an improv show I was doing that night, so to pass the time, I created a simple web experiment in CSS.
I bought the new 5th edition Dungeons and Dragons players handbook. Having thought 4th edition was somewhat akin to the Jar-Jar Binks of D&D, I was excited to be excited by the game again.
Jekyll is a tool for static site generation, and it’s what powers Github pages , both of which generate and host this site, respectively.
When a developer moves to a new company, one of the biggest transitions is adapting to the new code base. While most companies will be understanding of newcomers making their way into the rigorous complexities of unknown machine-speak, that slack isn’t limitless, and it’s important to understand the code quickly. It is, after all, the point of the developer’s employment.
Well this news is already more than two weeks old, but here it is nonetheless!