I find PHP’s boolean casting rules strange and hard to remember. I know I’m not alone.
Tech category↖ See all categories
I’ve vaguely known about CSS’s general sibling combinator for a while, but I have never found a practical use case for it, until now. And let me tell you, the results are, get ready for it, underwhelming.
A lot has changed in the world since I last posted. I have been extremely lucky during this pandemic. I am still employed, I can work from home, and I have my wife to shelter with. I do not take these things for granted. And yet.
Today I downloaded all the data Facebook has on me, and started poking through it. Since it’s been the focus of every privacy scandal, I went straight to the ad data. I found two items.
I wrote a small git pre-commit hook to prevent committing certain files. There are more words to this, but if you’re impatient, you can skip right to the goods .
I took a week off from work to join a deep dive study group on machine learning. It was an incredible experience and I want to tell you about what I learned.
This is not meant to be a take down piece, and I realize I’m not providing any direct solutions. I wouldn’t be writing about Drupal if I didn’t care about it. My hope is that my thoughts will prove useful in a much larger discussion.
Welcome, Internet folks! If you’ve been following along, this is the final post in my three part series on basic Internet security and privacy. In this article, we’re going to get into improving and—just as importantly—understanding Internet privacy.
The Situation ¶ You have a list of items that you need to render with comma separation, and an “and” at the end.
Welcome internet traveler, you’ve found your way to my guide on how to improve your online security. Already feel confident in your security abilities? Then get lost! I don’t need that kind of arrogance around here, especially when I’m trying to sound smart. The rest of you nice, humble people, read on.
Update: The next article in this series is now published . Confused about what privacy versus security means in the context of the internet? Haven’t heard these terms before, but are intrigued nonetheless? Not interested in any of this, but are inexplicably still reading? Whatever your deal is, welcome—you’ve found the laypersons guide to all this crap!
A quick, fun tip for Mac and command line users who are fans of The Lord of the Rings;
The other day I had some time in between work and an improv show I was doing that night, so to pass the time, I created a simple web experiment in CSS.
Jekyll is a tool for static site generation, and it’s what powers Github pages , both of which generate and host this site, respectively.
When a developer moves to a new company, one of the biggest transitions is adapting to the new code base. While most companies will be understanding of newcomers making their way into the rigorous complexities of unknown machine-speak, that slack isn’t limitless, and it’s important to understand the code quickly. It is, after all, the point of the developer’s employment.
Folks, I have stumbled upon something so nerdy, so impressive, and so potentially useless that I had to share it.