Writings and Resources on IT
Simple Linux (Ubuntu) Security
I’m setting up a Bitcoin full node to perform some analyses on the full blockchain. Here are quick steps I followed to improve the security of a basic Ubuntu box for these purposes . This is not meant to be an exhaustive list! Rather, this should serve as a general approach that helps you think […]
Mnemonic For OSI Model Layers
There are a million acronyms out there to help students remember the layers of the Open Systems Interconnection (OSI) model. Why offer another? Well, this one has worked best for me. As a reminder, the OSI Model Layers are as follows: AP(p)S Transport Network Data Physical(ly) I like this because it helps me remember several […]
Finding Big M: Iteratively Estimating The Mean
Several months ago I wanted to estimate the mean of a value for users of an online app as quickly as possible with as few samples as possible. Every data point required scraping a webpage, and this proved timely AND costly in terms of system resources. Additionally, if I triggered too much traffic with my […]
Monitor Network Traffic on an iOS Device Using Remote Virtual Interface
Monitor the network traffic on your iOS device using Apple’s Remote Virtual Interface on your Mac computer.
Xubri Educational Resources
One of my companies, StartingStrong.com, started a line of educational resources to help students finish good practice fast: Xubri. Now that the Xubri trademark has been registered, I’m going to start creating more educational resources under the Xubri name. You might wonder why we waited for the trademark to be finalized before investing the time […]
Dusted-Off Version of 1944 “Chart of Electromagnetic Radiations”
Here’s a dusted-off version of the 1944 “Chart of Electromagnetic Radiations” produced by the W. M. Welch Scientific Company and preserved and provided by the Lawrence Livermore National Laboratory.
Words [Not] to Capitalize in AP-Styled Titles: Don’t Mess With a Mouse
Remember which words to capitalize according to AP style guidelines with the limerick, “Don’t Mess With a Mouse.”
Automatically Generating Content Inventories (Part 1)
Downloading a local copy of a website and generating a list of broken links are the first steps in automatically creating a content inventory.
Isolating Side Effects Using Isolation Sets
Isolate side effects by using isolation sets, sets of potentially-pure and fall-through functions that cleanly and simply separate a program’s logic from its side effects.
Potentially pure functions are argument-based higher-order functions (i.e., functions that accept other functions as arguments) with pure function bodies (i.e., function bodies that are consistent and side-effect free), meaning their purity is dependent upon the arguments passed into the function.
Got any book recommendations?