-
Feedback as a selfish act
When feedback is shared, there are three entities who benefit. This post focuses on this third category: that the act of sharing feedback is in fact deeply beneficial to the provider of the feedback. First, the act of sharing feedback in a high-trust setting creates a reciprocal expectation that you are yourself open to receiving […]
-
Non-goals
The act of enumerating, discussing, and broadcasting the non-goals of a project is almost as important as the goal-setting process itself.
-
Combinatorics of parentheses and binary operators
Combining parentheses and binary operators to calculate arithmetic properties, and reasoning about their recurrence relations and generic closed forms.
-
Effective and ineffective Wi-Fi security
Which methods to secure a Wi-Fi network actually work, and which are just bumps on the road to an attacker gaining full access to your private network?
-
Matching on boolean values using switch statements
A different way to think about switch statements, using a boolean value to evaluate against each case’s logical expression for comparison.
-
Generating random data, part 2
Given various sources of random data on a Unix system, which are the most efficient while also producing sufficiently random data?
-
Generating random data, part 1
Why are computers so bad at behaving unpredictably, and how can we generate random data effectively?
-
Emerging trends in application delivery
A look back at how application delivery has evolved, and how we can expect it to change in the coming years.
-
The functional and performance differences of sed, awk and other Unix parsing utilities
What is the difference between the Unix utilities sed, awk and grep?
-
Search and replace using regular expression callbacks
How can you have more programmatic control of replacements in regex expressions?