Latest Posts

5 min read 0

How to Cheat in JS Object Manipulation

Often in JavaScript, we’ve got to manipulate JavaScript Objects in order to serve a purpose. Today I’m going to cover a quick way to cheat…
1 min read 0

Ninja Rules of Self-Identification

A ninja does not self-identify as a ninja. <rant>In our field, a lot of folks will call themselves “ninjas” or “10x devs” or “experts,” but…
13 min read 0

Definition of Dependencies

Definition of Dependencies When I discuss the topic of dependencies with other developers, I often find that we approach the conversation with differing definitions of…
4 min read 0

Observations on Tech Work

As I think back on the 24 years I’ve worked in technology, I would like to share with you three observations. These aren’t the most…
4 min read 0

String Manipulation of URLs is an Anti-Pattern.

Quick note before we get started: this piece is Node-centric in its examples, but this anti-pattern is polyglottal. As with most anti-patterns, this isn’t about…
5 min read 0

Warning: Elaborate Scams Abound!

Hey all! This post won’t be long, and I’m sorry but it won’t be terribly technical either. Tonight I had an encounter with a scam…
1 min read 0

I wish AWS had more useful error messages.

Sorry, this is more of a complaint than anything else. I’ve spent the better part of two days troubleshooting a ValidationException in a CloudFormation stack…
3 min read 0

Reviving old code.

One of the joys of Perl is the rich community support that it has enjoyed over the years. Even today when other languages are surging…
7 min read 0

iPad as a Workstation

NOTE: I do not work for any of the companies that make any of the products below, nor do I earn anything from mentioning their…