Adam Jon R.

Illustration of a bird flying.
  • Simple Linux (Ubuntu) Security

    I’m setting up a Bitcoin full node to perform some analyses on the full blockchain. Here are quick steps I followed to improve the security of a basic Ubuntu box for these purposes [1]. This is not meant to be an exhaustive list! Rather, this should serve as a general approach that helps you think […]

    February 25, 2021
  • Mnemonic For OSI Model Layers

    There are a million acronyms out there to help students remember the layers of the Open Systems Interconnection (OSI) model. Why offer another? Well, this one has worked best for me. As a reminder, the OSI Model Layers are as follows: Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: […]

    June 12, 2020
  • Finding Big M: Iteratively Estimating The Mean

    Several months ago I wanted to estimate the mean of a value for users of an online app as quickly as possible with as few samples as possible. Every data point required scraping a webpage, and this proved timely AND costly in terms of system resources. Additionally, if I triggered too much traffic with my […]

    February 8, 2020
  • Monitor Network Traffic on an iOS Device Using Remote Virtual Interface

    Monitor the network traffic on your iOS device using Apple’s Remote Virtual Interface on your Mac computer.

    January 3, 2020
  • Xubri Educational Resources

    One of my companies, StartingStrong.com, started a line of educational resources to help students finish good practice fast: Xubri. Now that the Xubri trademark has been registered, I’m going to start creating more educational resources under the Xubri name. You might wonder why we waited for the trademark to be finalized before investing the time […]

    January 17, 2017
  • Dusted-Off Version of 1944 “Chart of Electromagnetic Radiations”

    Here’s a dusted-off version of the 1944 “Chart of Electromagnetic Radiations” produced by the W. M. Welch Scientific Company and preserved and provided by the Lawrence Livermore National Laboratory.

    April 7, 2016
  • Passpics: A Picture Is Worth a Thousand Passwords

    We already use images all the time in our digital lives. Because of their inherent advantages in terms of usability and security, it makes sense to leverage them in the form of passpics for authentication.

    August 29, 2015
  • I Wish We Used Domain Specific Languages (DSLs) More

    First, let me define a Domain Specific Language (DSL). A DSL as a small programming language specifically designed to communicate solutions for a particular domain of problems. To expand on this definition, while the discussion of DSLs can include  internal DSLs, which are implemented directly within a General Programming Language (GPL) using the available language constructs, I’ll primarily be […]

    July 26, 2015
  • Words [Not] to Capitalize in AP-Styled Titles: Don’t Mess With a Mouse

    Remember which words to capitalize according to AP style guidelines with the limerick, “Don’t Mess With a Mouse.”

    November 4, 2014
  • Automatically Generating Content Inventories (Part 1)

    Downloading a local copy of a website and generating a list of broken links are the first steps in automatically creating a content inventory.

    September 1, 2014
1 2 3
Next Page→

Adam Jon R.

Proudly powered by WordPress